General
-
Target
a52bb2f33ad0b18d298a40c07799ccb1_JaffaCakes118
-
Size
3.4MB
-
Sample
241127-btlcbswnbm
-
MD5
a52bb2f33ad0b18d298a40c07799ccb1
-
SHA1
ba2f270773159b858894167281535c725ed7ff11
-
SHA256
b90ca330c6c4dfd459fb04c6bf0953b05547c9965151223981bdeac1f5850f31
-
SHA512
3cc0ddc0255159db8dbfae0b71624aa8d0b1df918ab712e2778ecbd0cc3e15b2bcd879f158b20605c7772d746661ef64103a73ed60b32b38a2baf8169e3fe895
-
SSDEEP
98304:xV5IPxE1GxU19N6KmYba4GGfOHYaWoH/R2ikCvLUBsKJEdVS:xV56x4+UTN6KmYe4GGfOHp/R2i5LUCKh
Static task
static1
Malware Config
Extracted
nullmixer
http://marisana.xyz/
Extracted
redline
OLKani
ataninamei.xyz:80
Extracted
privateloader
http://37.0.8.235/proxies.txt
http://37.0.11.8/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.11.9
Targets
-
-
Target
a52bb2f33ad0b18d298a40c07799ccb1_JaffaCakes118
-
Size
3.4MB
-
MD5
a52bb2f33ad0b18d298a40c07799ccb1
-
SHA1
ba2f270773159b858894167281535c725ed7ff11
-
SHA256
b90ca330c6c4dfd459fb04c6bf0953b05547c9965151223981bdeac1f5850f31
-
SHA512
3cc0ddc0255159db8dbfae0b71624aa8d0b1df918ab712e2778ecbd0cc3e15b2bcd879f158b20605c7772d746661ef64103a73ed60b32b38a2baf8169e3fe895
-
SSDEEP
98304:xV5IPxE1GxU19N6KmYba4GGfOHYaWoH/R2ikCvLUBsKJEdVS:xV56x4+UTN6KmYe4GGfOHp/R2i5LUCKh
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Vidar family
-
Xmrig family
-
Vidar Stealer
-
XMRig Miner payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2