General

  • Target

    c890def4f485babf0698e84fbf6d84a1_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240829-lh58gawhll

  • MD5

    c890def4f485babf0698e84fbf6d84a1

  • SHA1

    735345c337ec57e155bfcabbcf3d10a6195003a3

  • SHA256

    e8d936af8c5751155a74eec453e88edad5a85b5ed95ed1c999a244f721c89068

  • SHA512

    fc20c930f4b470314dd7563c76dfcd199f078f4737843ec09f48ae5d756c8ab81bc36294852a9de853113218ebf2f28f2a5cead9bd633bac4912da62385c789e

  • SSDEEP

    49152:Lz071uv4BPMkibTIA5sf6r+WVc2HhG82g1Vr5s1PTWsuT9f:NAB+

Malware Config

Targets

    • Target

      c890def4f485babf0698e84fbf6d84a1_JaffaCakes118

    • Size

      2.2MB

    • MD5

      c890def4f485babf0698e84fbf6d84a1

    • SHA1

      735345c337ec57e155bfcabbcf3d10a6195003a3

    • SHA256

      e8d936af8c5751155a74eec453e88edad5a85b5ed95ed1c999a244f721c89068

    • SHA512

      fc20c930f4b470314dd7563c76dfcd199f078f4737843ec09f48ae5d756c8ab81bc36294852a9de853113218ebf2f28f2a5cead9bd633bac4912da62385c789e

    • SSDEEP

      49152:Lz071uv4BPMkibTIA5sf6r+WVc2HhG82g1Vr5s1PTWsuT9f:NAB+

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks