General

  • Target

    2a59f2d14b19853806e8ae65daf40349_JaffaCakes118

  • Size

    1.9MB

  • Sample

    240509-rk73qsdg4s

  • MD5

    2a59f2d14b19853806e8ae65daf40349

  • SHA1

    65124e3a125b42e7b394e2226e5a6182fd668249

  • SHA256

    19850df100c21d0f04e5949156888899b012ff942340916bc5b2618b78ebf8c7

  • SHA512

    1376b92285ef05c2acdd4857bf37702462c04700acb5159d26f6577e9a62b93f745d8c79e5de17785108c53e3c3fe0e998932e26a1ed3b0e9919d63567a91b39

  • SSDEEP

    49152:Lz071uv4BPMkibTIA5lCx7kvRWa4pXHafu:NABb

Malware Config

Targets

    • Target

      2a59f2d14b19853806e8ae65daf40349_JaffaCakes118

    • Size

      1.9MB

    • MD5

      2a59f2d14b19853806e8ae65daf40349

    • SHA1

      65124e3a125b42e7b394e2226e5a6182fd668249

    • SHA256

      19850df100c21d0f04e5949156888899b012ff942340916bc5b2618b78ebf8c7

    • SHA512

      1376b92285ef05c2acdd4857bf37702462c04700acb5159d26f6577e9a62b93f745d8c79e5de17785108c53e3c3fe0e998932e26a1ed3b0e9919d63567a91b39

    • SSDEEP

      49152:Lz071uv4BPMkibTIA5lCx7kvRWa4pXHafu:NABb

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks