General
-
Target
15ac7db3646e777b1b73111d99e7fb02_JaffaCakes118
-
Size
2.3MB
-
Sample
240505-dgltfacg31
-
MD5
15ac7db3646e777b1b73111d99e7fb02
-
SHA1
3727d54d54d217e3963b6e6c2caa8cb6d4cbf3e7
-
SHA256
6f0b0244e514deb395b4c859eb957e611a9cf32ec1fe4a91ac012e13fc351d14
-
SHA512
9bf8555b1f521c6b24692fd85257aed7da8ba750f885bd931c116e838ad15e087b8d13050965d5527d070ac540b2b430d05c1de6a2ae3c196ea6ec20cca432c7
-
SSDEEP
49152:Lz071uv4BPMkibTIA5sf6r+WVc2HhG82g1Vr5s1PTWsuT9ced:NABU
Behavioral task
behavioral1
Sample
15ac7db3646e777b1b73111d99e7fb02_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
15ac7db3646e777b1b73111d99e7fb02_JaffaCakes118
-
Size
2.3MB
-
MD5
15ac7db3646e777b1b73111d99e7fb02
-
SHA1
3727d54d54d217e3963b6e6c2caa8cb6d4cbf3e7
-
SHA256
6f0b0244e514deb395b4c859eb957e611a9cf32ec1fe4a91ac012e13fc351d14
-
SHA512
9bf8555b1f521c6b24692fd85257aed7da8ba750f885bd931c116e838ad15e087b8d13050965d5527d070ac540b2b430d05c1de6a2ae3c196ea6ec20cca432c7
-
SSDEEP
49152:Lz071uv4BPMkibTIA5sf6r+WVc2HhG82g1Vr5s1PTWsuT9ced:NABU
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-