General
-
Target
JaffaCakes118_5b4e5e444ee2e388e0bf6e65c23fbbf8
-
Size
54KB
-
Sample
250309-z4b4ea1qw6
-
MD5
5b4e5e444ee2e388e0bf6e65c23fbbf8
-
SHA1
596a7597a26a01d90d1c71b6c26570e2fa8a4a8e
-
SHA256
b5d1bd6e0e12a8efc77b19e9a41007640738d5f9289edede252a14cd6e1c5e24
-
SHA512
80ab0fb905c1b2f0dbfa2a05c05723485881d463570408b5a47384df262090111607095e11eee8b2889b61f5c8d1e64726acaacf3eb9b93a6523e6bc367e836c
-
SSDEEP
768:/vWqjOJZcEG8uni2h4HpiuDEDmAnYhEM2cmnN50w5rEwMrboCbH0MAiZI:78ZcE7sCg6oX50w5rT7C4iZI
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5b4e5e444ee2e388e0bf6e65c23fbbf8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5b4e5e444ee2e388e0bf6e65c23fbbf8.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
JaffaCakes118_5b4e5e444ee2e388e0bf6e65c23fbbf8
-
Size
54KB
-
MD5
5b4e5e444ee2e388e0bf6e65c23fbbf8
-
SHA1
596a7597a26a01d90d1c71b6c26570e2fa8a4a8e
-
SHA256
b5d1bd6e0e12a8efc77b19e9a41007640738d5f9289edede252a14cd6e1c5e24
-
SHA512
80ab0fb905c1b2f0dbfa2a05c05723485881d463570408b5a47384df262090111607095e11eee8b2889b61f5c8d1e64726acaacf3eb9b93a6523e6bc367e836c
-
SSDEEP
768:/vWqjOJZcEG8uni2h4HpiuDEDmAnYhEM2cmnN50w5rEwMrboCbH0MAiZI:78ZcE7sCg6oX50w5rT7C4iZI
Score10/10-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-