General

  • Target

    15ac7db3646e777b1b73111d99e7fb02_JaffaCakes118

  • Size

    2.3MB

  • Sample

    240505-dgltfacg31

  • MD5

    15ac7db3646e777b1b73111d99e7fb02

  • SHA1

    3727d54d54d217e3963b6e6c2caa8cb6d4cbf3e7

  • SHA256

    6f0b0244e514deb395b4c859eb957e611a9cf32ec1fe4a91ac012e13fc351d14

  • SHA512

    9bf8555b1f521c6b24692fd85257aed7da8ba750f885bd931c116e838ad15e087b8d13050965d5527d070ac540b2b430d05c1de6a2ae3c196ea6ec20cca432c7

  • SSDEEP

    49152:Lz071uv4BPMkibTIA5sf6r+WVc2HhG82g1Vr5s1PTWsuT9ced:NABU

Malware Config

Targets

    • Target

      15ac7db3646e777b1b73111d99e7fb02_JaffaCakes118

    • Size

      2.3MB

    • MD5

      15ac7db3646e777b1b73111d99e7fb02

    • SHA1

      3727d54d54d217e3963b6e6c2caa8cb6d4cbf3e7

    • SHA256

      6f0b0244e514deb395b4c859eb957e611a9cf32ec1fe4a91ac012e13fc351d14

    • SHA512

      9bf8555b1f521c6b24692fd85257aed7da8ba750f885bd931c116e838ad15e087b8d13050965d5527d070ac540b2b430d05c1de6a2ae3c196ea6ec20cca432c7

    • SSDEEP

      49152:Lz071uv4BPMkibTIA5sf6r+WVc2HhG82g1Vr5s1PTWsuT9ced:NABU

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks