General
-
Target
5a5fe86d32660877662cd4bc0916e87c_JaffaCakes118
-
Size
172KB
-
Sample
240519-t4n53sff72
-
MD5
5a5fe86d32660877662cd4bc0916e87c
-
SHA1
feb13462ea4bca01318b49fe8e00532b3cae39c9
-
SHA256
a88b3765265ed52ebaee7dbf55b41744c509cfc8a5fe18e1d443a46e199935a6
-
SHA512
62dea3c54ecef4eb1c200b0cc538e4715c2e70781c87d11a0a256b3ae81c531b6a1b6bdd4f9a634b8ab3decff0c848177b964d34cb7fae2b398c14ff63e69215
-
SSDEEP
1536:IOvr/4Dz5/HILz2uaPokkeaH1F8fZ/t1HXff1F/5/HILz2uaPokkeapD8/gv:H/41HY2uaPoMcSLL9HY2uaPoM0w/
Static task
static1
Behavioral task
behavioral1
Sample
5a5fe86d32660877662cd4bc0916e87c_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5a5fe86d32660877662cd4bc0916e87c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=15ra3TwERA8gReH3xRZ3zJe1fcJQfkUpG
Targets
-
-
Target
5a5fe86d32660877662cd4bc0916e87c_JaffaCakes118
-
Size
172KB
-
MD5
5a5fe86d32660877662cd4bc0916e87c
-
SHA1
feb13462ea4bca01318b49fe8e00532b3cae39c9
-
SHA256
a88b3765265ed52ebaee7dbf55b41744c509cfc8a5fe18e1d443a46e199935a6
-
SHA512
62dea3c54ecef4eb1c200b0cc538e4715c2e70781c87d11a0a256b3ae81c531b6a1b6bdd4f9a634b8ab3decff0c848177b964d34cb7fae2b398c14ff63e69215
-
SSDEEP
1536:IOvr/4Dz5/HILz2uaPokkeaH1F8fZ/t1HXff1F/5/HILz2uaPokkeapD8/gv:H/41HY2uaPoMcSLL9HY2uaPoM0w/
Score10/10-
Guloader payload
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-