General

  • Target

    041b73c4ce2513c6ebfc63a5940bb352_JaffaCakes118

  • Size

    1.7MB

  • Sample

    240728-a7dzqs1elb

  • MD5

    041b73c4ce2513c6ebfc63a5940bb352

  • SHA1

    e536585cd1b8624c543da04bd2ba97bd7d83cf46

  • SHA256

    508e1581e9cc15c791e8294f72a7cf28105bff65cef5f5b306938e259d8f0219

  • SHA512

    d2869d0b0ff2830987beaae4e6de7351afdda64decbf43603bae53184958244975abd3939ac33c9f3b7388013e20b6980eb94a5640e9d12453c18e722deca5ff

  • SSDEEP

    49152:Lz071uv4BPMkibTIA5lCx7kvRWa4pXeuQD:NAB0

Malware Config

Targets

    • Target

      041b73c4ce2513c6ebfc63a5940bb352_JaffaCakes118

    • Size

      1.7MB

    • MD5

      041b73c4ce2513c6ebfc63a5940bb352

    • SHA1

      e536585cd1b8624c543da04bd2ba97bd7d83cf46

    • SHA256

      508e1581e9cc15c791e8294f72a7cf28105bff65cef5f5b306938e259d8f0219

    • SHA512

      d2869d0b0ff2830987beaae4e6de7351afdda64decbf43603bae53184958244975abd3939ac33c9f3b7388013e20b6980eb94a5640e9d12453c18e722deca5ff

    • SSDEEP

      49152:Lz071uv4BPMkibTIA5lCx7kvRWa4pXeuQD:NAB0

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks