General
-
Target
0f6eae8a93f85560ce2df141cc74ec62_JaffaCakes118
-
Size
2.2MB
-
Sample
240503-cly4wsce3v
-
MD5
0f6eae8a93f85560ce2df141cc74ec62
-
SHA1
811005a214c7299fec98d73d3a435b8c3db0a369
-
SHA256
cdfb5eceef238cb0fc3e5941435bd89b333081f1b7a5bee85ce46621c12d2043
-
SHA512
c9a7a88244e08a9ed9ce41374079fbadda51a8f2b1a7e2090e79bdf3eaaffdde31c0593b9e1ba1ef252d2bf0cbae0658f8e78d280a28129aa04c762277bb1413
-
SSDEEP
49152:Lz071uv4BPMkibTIA5sf6r+WVc2HhG82g1VQx7Va4qrfKb:NAB1
Behavioral task
behavioral1
Sample
0f6eae8a93f85560ce2df141cc74ec62_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
0f6eae8a93f85560ce2df141cc74ec62_JaffaCakes118
-
Size
2.2MB
-
MD5
0f6eae8a93f85560ce2df141cc74ec62
-
SHA1
811005a214c7299fec98d73d3a435b8c3db0a369
-
SHA256
cdfb5eceef238cb0fc3e5941435bd89b333081f1b7a5bee85ce46621c12d2043
-
SHA512
c9a7a88244e08a9ed9ce41374079fbadda51a8f2b1a7e2090e79bdf3eaaffdde31c0593b9e1ba1ef252d2bf0cbae0658f8e78d280a28129aa04c762277bb1413
-
SSDEEP
49152:Lz071uv4BPMkibTIA5sf6r+WVc2HhG82g1VQx7Va4qrfKb:NAB1
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-