General

  • Target

    16a11562a9d98d3dc04800478a5fb7a7_JaffaCakes118

  • Size

    1.9MB

  • Sample

    240505-jdfqxaed46

  • MD5

    16a11562a9d98d3dc04800478a5fb7a7

  • SHA1

    aaa46e49619a1d1e3e9c71d601444aef76c4f44d

  • SHA256

    25387855ab02feea9f0272049a0ed7be5efec3bced623a55de0960704eeeba65

  • SHA512

    5676ff950401691319739f6f86f10fac5d838300531841901d0945eef30e9eb2aa12183e8068db75dd57b21ffbe59e4fc436368fca0e673a385357a07e015eff

  • SSDEEP

    49152:Lz071uv4BPMkibTIA5lCx7kvRWa4pXHafk:NABb

Malware Config

Targets

    • Target

      16a11562a9d98d3dc04800478a5fb7a7_JaffaCakes118

    • Size

      1.9MB

    • MD5

      16a11562a9d98d3dc04800478a5fb7a7

    • SHA1

      aaa46e49619a1d1e3e9c71d601444aef76c4f44d

    • SHA256

      25387855ab02feea9f0272049a0ed7be5efec3bced623a55de0960704eeeba65

    • SHA512

      5676ff950401691319739f6f86f10fac5d838300531841901d0945eef30e9eb2aa12183e8068db75dd57b21ffbe59e4fc436368fca0e673a385357a07e015eff

    • SSDEEP

      49152:Lz071uv4BPMkibTIA5lCx7kvRWa4pXHafk:NABb

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks