General
-
Target
3c7b11a7b7f4549d9bc7624290e2844c_JaffaCakes118
-
Size
2.3MB
-
Sample
240513-zew3aach5x
-
MD5
3c7b11a7b7f4549d9bc7624290e2844c
-
SHA1
96d88e73bdbf0bf63a3c6ccba116ee487f3560ff
-
SHA256
b1e13a4686e82a5bf9f9a4746e9f0b9e551d68f7c73ade85634062c1ba7ad1fe
-
SHA512
026b115b138715a6e124ef90482e2955165ae69e375703ae86f5c4981380c0b4f1e3f67d4079b11ae1268a1a4b0d162cf60c6e8bad273b68d238ee39f529839d
-
SSDEEP
49152:Lz071uv4BPMkibTIA5sf6r+WVc2HhG82g1VQx7Va4qrT:NABK
Behavioral task
behavioral1
Sample
3c7b11a7b7f4549d9bc7624290e2844c_JaffaCakes118.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
3c7b11a7b7f4549d9bc7624290e2844c_JaffaCakes118
-
Size
2.3MB
-
MD5
3c7b11a7b7f4549d9bc7624290e2844c
-
SHA1
96d88e73bdbf0bf63a3c6ccba116ee487f3560ff
-
SHA256
b1e13a4686e82a5bf9f9a4746e9f0b9e551d68f7c73ade85634062c1ba7ad1fe
-
SHA512
026b115b138715a6e124ef90482e2955165ae69e375703ae86f5c4981380c0b4f1e3f67d4079b11ae1268a1a4b0d162cf60c6e8bad273b68d238ee39f529839d
-
SSDEEP
49152:Lz071uv4BPMkibTIA5sf6r+WVc2HhG82g1VQx7Va4qrT:NABK
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-