General
-
Target
0d364ac7e5abe0363e6f17201f6e89e5_JaffaCakes118
-
Size
1.8MB
-
Sample
240502-crpgmsec8z
-
MD5
0d364ac7e5abe0363e6f17201f6e89e5
-
SHA1
1922b35dffd5574f4781699681b7b8823694017d
-
SHA256
3eab933b82077df388e9ecce311659bc1a8c3d27c1c252db72f0350f950df2b8
-
SHA512
a3b6fd1873ef5a10b17dcf68ca4bf341a3841ccfc47ce5e4ddfe5885f361fc92678fa174c2d7d2802abe78e90f10865e6e959acb6c53c101640b336d68b74867
-
SSDEEP
49152:Lz071uv4BPMkibTIA5lCx7kvRWa4p/pOI:NABv
Behavioral task
behavioral1
Sample
0d364ac7e5abe0363e6f17201f6e89e5_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
0d364ac7e5abe0363e6f17201f6e89e5_JaffaCakes118
-
Size
1.8MB
-
MD5
0d364ac7e5abe0363e6f17201f6e89e5
-
SHA1
1922b35dffd5574f4781699681b7b8823694017d
-
SHA256
3eab933b82077df388e9ecce311659bc1a8c3d27c1c252db72f0350f950df2b8
-
SHA512
a3b6fd1873ef5a10b17dcf68ca4bf341a3841ccfc47ce5e4ddfe5885f361fc92678fa174c2d7d2802abe78e90f10865e6e959acb6c53c101640b336d68b74867
-
SSDEEP
49152:Lz071uv4BPMkibTIA5lCx7kvRWa4p/pOI:NABv
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-