General

  • Target

    0f38036e062620638159d1a655188cde_JaffaCakes118

  • Size

    1.9MB

  • Sample

    240503-ahevqscb55

  • MD5

    0f38036e062620638159d1a655188cde

  • SHA1

    b6f79c73fc2c640053334c62a197909ea228fcc3

  • SHA256

    2d5800178316d466614059e642feac677e37ff3a197c97fe36d5bb47df89b1f8

  • SHA512

    70551cf73d7e279b3d0ca4529a9f5b40d1b69e9edc5faa1e733c461bc19119da0705cdaed0617fd610793e5ea373aa4de4a77ff9e5923174198b8456912326dd

  • SSDEEP

    49152:Lz071uv4BPMkibTIA5lCx7kvRWa4p/pO6o:NABs

Malware Config

Targets

    • Target

      0f38036e062620638159d1a655188cde_JaffaCakes118

    • Size

      1.9MB

    • MD5

      0f38036e062620638159d1a655188cde

    • SHA1

      b6f79c73fc2c640053334c62a197909ea228fcc3

    • SHA256

      2d5800178316d466614059e642feac677e37ff3a197c97fe36d5bb47df89b1f8

    • SHA512

      70551cf73d7e279b3d0ca4529a9f5b40d1b69e9edc5faa1e733c461bc19119da0705cdaed0617fd610793e5ea373aa4de4a77ff9e5923174198b8456912326dd

    • SSDEEP

      49152:Lz071uv4BPMkibTIA5lCx7kvRWa4p/pO6o:NABs

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks