General

  • Target

    6394952f9ba72b042a4e170483c06940_JaffaCakes118

  • Size

    2.0MB

  • Sample

    240521-rktkcagg55

  • MD5

    6394952f9ba72b042a4e170483c06940

  • SHA1

    c752e52bc7aacb29a57676e05503775b855cd32f

  • SHA256

    8265a11272948d9c455c2deb2c5caac97af54eb903c497d45afa3a373cb3b7a7

  • SHA512

    193b66de5b7f21f7fecee22cdc22a806b3a4a5d35c28b36882d90bc2055d4228fdfc23e8f6d03d8d5735044ab2213167480f6fe1a4daca06aeba9a5c74e7b2de

  • SSDEEP

    49152:Lz071uv4BPMkibTIA5lCx7kvRWa4pXHafMK:NABi

Malware Config

Targets

    • Target

      6394952f9ba72b042a4e170483c06940_JaffaCakes118

    • Size

      2.0MB

    • MD5

      6394952f9ba72b042a4e170483c06940

    • SHA1

      c752e52bc7aacb29a57676e05503775b855cd32f

    • SHA256

      8265a11272948d9c455c2deb2c5caac97af54eb903c497d45afa3a373cb3b7a7

    • SHA512

      193b66de5b7f21f7fecee22cdc22a806b3a4a5d35c28b36882d90bc2055d4228fdfc23e8f6d03d8d5735044ab2213167480f6fe1a4daca06aeba9a5c74e7b2de

    • SSDEEP

      49152:Lz071uv4BPMkibTIA5lCx7kvRWa4pXHafMK:NABi

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks