General
-
Target
006bb5643bd5b4eefdf153a43139634f_JaffaCakes118
-
Size
2.1MB
-
Sample
240426-kv7fmada96
-
MD5
006bb5643bd5b4eefdf153a43139634f
-
SHA1
f9a1f26f78b54deaf0c258d44cb3ed5cffd3db99
-
SHA256
e18d52f7f8cd8113c7af2056d4c4528e52ead13924c8ca049cdbb9d2d55df3cb
-
SHA512
dd9474b28c7d1376f6618ba2fbab60906c7e04e24b71ff209bbc77964362edd4da528d8bf8785d32a9b79021781f1504cd08cb89dc18c8637755cbba9fd8c150
-
SSDEEP
49152:Lz071uv4BPMkibTIA5lCx7kvRWa4pXHafMH:NABP
Behavioral task
behavioral1
Sample
006bb5643bd5b4eefdf153a43139634f_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
006bb5643bd5b4eefdf153a43139634f_JaffaCakes118
-
Size
2.1MB
-
MD5
006bb5643bd5b4eefdf153a43139634f
-
SHA1
f9a1f26f78b54deaf0c258d44cb3ed5cffd3db99
-
SHA256
e18d52f7f8cd8113c7af2056d4c4528e52ead13924c8ca049cdbb9d2d55df3cb
-
SHA512
dd9474b28c7d1376f6618ba2fbab60906c7e04e24b71ff209bbc77964362edd4da528d8bf8785d32a9b79021781f1504cd08cb89dc18c8637755cbba9fd8c150
-
SSDEEP
49152:Lz071uv4BPMkibTIA5lCx7kvRWa4pXHafMH:NABP
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-