General
-
Target
133b22daeb05a907491ce1c8fbef04b9_JaffaCakes118
-
Size
689KB
-
Sample
240626-ylqcmstbjn
-
MD5
133b22daeb05a907491ce1c8fbef04b9
-
SHA1
f801a99437c15f0ac34fe3297b945bf410c37cc2
-
SHA256
fdc99489f71d7f72e1ec5746cdae8cc7d441c28082de699d6e066c1c16b1ee77
-
SHA512
2f7ce692eaf86275eeba0eece50841b3f74668ab00be62c3d310cf1201cbdca48fd2b2535302019856ee4c57bc8f6da6471abed89f9d2bce14e89815e7df67ad
-
SSDEEP
12288:dGezWOMTBYrGEVbsgr1mCk5Ko0L78a3BeBv8P8oaTGUZy9amJ9q3K4P3x8c8Hx3w:lLMTBYyEOgkCWK3BeBUkpG1cmJoXfx3P
Static task
static1
Behavioral task
behavioral1
Sample
133b22daeb05a907491ce1c8fbef04b9_JaffaCakes118.exe
Resource
win7-20240611-en
Malware Config
Extracted
darkcomet
Guest16
botnetclients.zapto.org:1604
DC_MUTEX-4ET0BTN
-
gencode
vkUUxAwqAkJT
-
install
false
-
offline_keylogger
true
-
persistence
false
Extracted
latentbot
botnetclients.zapto.org
Targets
-
-
Target
133b22daeb05a907491ce1c8fbef04b9_JaffaCakes118
-
Size
689KB
-
MD5
133b22daeb05a907491ce1c8fbef04b9
-
SHA1
f801a99437c15f0ac34fe3297b945bf410c37cc2
-
SHA256
fdc99489f71d7f72e1ec5746cdae8cc7d441c28082de699d6e066c1c16b1ee77
-
SHA512
2f7ce692eaf86275eeba0eece50841b3f74668ab00be62c3d310cf1201cbdca48fd2b2535302019856ee4c57bc8f6da6471abed89f9d2bce14e89815e7df67ad
-
SSDEEP
12288:dGezWOMTBYrGEVbsgr1mCk5Ko0L78a3BeBv8P8oaTGUZy9amJ9q3K4P3x8c8Hx3w:lLMTBYyEOgkCWK3BeBUkpG1cmJoXfx3P
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-