General
-
Target
JaffaCakes118_895cc284825810712eb7a85b28533cca
-
Size
392KB
-
Sample
250326-3dhp2swr12
-
MD5
895cc284825810712eb7a85b28533cca
-
SHA1
48e818ba3f6002a4f1ef086b561df40dea4f2b78
-
SHA256
0d162cd950a2dd847ba0def915e1b77e71fcb42ee7ccfc1c442d8c9c59856c86
-
SHA512
c20050ac01816304b3efede26b63af5087608755275cad06becbd2ff26330bccafe95678f8ad9dfcec268482ad5ff33f55a4294fae44898d0f867387eb40135d
-
SSDEEP
12288:7dxeU2Gq3B1OArDJOTC2qaKG46r47LUL3LvBeFt:7G3B1Hr8TKaB4k47LUnvBA
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_895cc284825810712eb7a85b28533cca.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Guest16
edmosby.no-ip.org:1604
DC_MUTEX-0V1ZN3L
-
gencode
K.jmGidi=Rj5
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
JaffaCakes118_895cc284825810712eb7a85b28533cca
-
Size
392KB
-
MD5
895cc284825810712eb7a85b28533cca
-
SHA1
48e818ba3f6002a4f1ef086b561df40dea4f2b78
-
SHA256
0d162cd950a2dd847ba0def915e1b77e71fcb42ee7ccfc1c442d8c9c59856c86
-
SHA512
c20050ac01816304b3efede26b63af5087608755275cad06becbd2ff26330bccafe95678f8ad9dfcec268482ad5ff33f55a4294fae44898d0f867387eb40135d
-
SSDEEP
12288:7dxeU2Gq3B1OArDJOTC2qaKG46r47LUL3LvBeFt:7G3B1Hr8TKaB4k47LUnvBA
-
Darkcomet family
-
Windows security bypass
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Windows security modification
-
Suspicious use of SetThreadContext
-