General

  • Target

    0307ca3c365f1ef650059ef485d4f11e_JaffaCakes118

  • Size

    1.9MB

  • Sample

    240727-312rfawbpn

  • MD5

    0307ca3c365f1ef650059ef485d4f11e

  • SHA1

    699b778397a7dedcb67f9862205141fa9d4bd995

  • SHA256

    ced771b93ade81192182dda9318a80a473f03b431819486e266a4832dc75268f

  • SHA512

    8a69613b8f879ec1d0c225d5221dabfa99805e81eaa6bef60863b53d3b64e33db09507247337103c5e7469f7e3044c503c593aaa470364f71c1f05075e8c398b

  • SSDEEP

    49152:Lz071uv4BPMkibTIA5KIP7nTrmBhihM5xC+U16:NAB5

Malware Config

Targets

    • Target

      0307ca3c365f1ef650059ef485d4f11e_JaffaCakes118

    • Size

      1.9MB

    • MD5

      0307ca3c365f1ef650059ef485d4f11e

    • SHA1

      699b778397a7dedcb67f9862205141fa9d4bd995

    • SHA256

      ced771b93ade81192182dda9318a80a473f03b431819486e266a4832dc75268f

    • SHA512

      8a69613b8f879ec1d0c225d5221dabfa99805e81eaa6bef60863b53d3b64e33db09507247337103c5e7469f7e3044c503c593aaa470364f71c1f05075e8c398b

    • SSDEEP

      49152:Lz071uv4BPMkibTIA5KIP7nTrmBhihM5xC+U16:NAB5

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks