General
-
Target
c71460537b9584b5f550df694b80c9aa_JaffaCakes118
-
Size
7.5MB
-
Sample
241205-lncs4syncw
-
MD5
c71460537b9584b5f550df694b80c9aa
-
SHA1
bf96ffa379cb297d91d994a63e04f03d94eb8139
-
SHA256
c329c73a0c1f6f156cc7a662abdf5e7ea30ed8b8f4b35253bf7f2435b83445c8
-
SHA512
613c7165a1572c72fae2c721bf0e896304eb52eb04463333fae39f699d6da5390a7ee103907c245bd8537a3a183e6e76610a1bfc557e029ae58bf23ef269dfea
-
SSDEEP
98304:gF8b2yodBaTJlvTuD17o2J5nsIsrInNI1TV++ykbHMOCXO6:g2b8SLA1M2sIX0kk5Ce6
Static task
static1
Behavioral task
behavioral1
Sample
c71460537b9584b5f550df694b80c9aa_JaffaCakes118.exe
Resource
win7-20241023-en
Malware Config
Extracted
amadey
2.61
a6b927
http://185.215.113.25
-
install_dir
e8a12a95fa
-
install_file
sqtvvs.exe
-
strings_key
1cc248008096bc1c8e6f468b951db183
-
url_paths
/f6vskbW/index.php
Extracted
vidar
41.1
933
https://mas.to/@bardak1ho
-
profile_id
933
Extracted
gcleaner
gcl-page.biz
194.145.227.161
Targets
-
-
Target
c71460537b9584b5f550df694b80c9aa_JaffaCakes118
-
Size
7.5MB
-
MD5
c71460537b9584b5f550df694b80c9aa
-
SHA1
bf96ffa379cb297d91d994a63e04f03d94eb8139
-
SHA256
c329c73a0c1f6f156cc7a662abdf5e7ea30ed8b8f4b35253bf7f2435b83445c8
-
SHA512
613c7165a1572c72fae2c721bf0e896304eb52eb04463333fae39f699d6da5390a7ee103907c245bd8537a3a183e6e76610a1bfc557e029ae58bf23ef269dfea
-
SSDEEP
98304:gF8b2yodBaTJlvTuD17o2J5nsIsrInNI1TV++ykbHMOCXO6:g2b8SLA1M2sIX0kk5Ce6
-
Amadey family
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Onlylogger family
-
Vidar family
-
Xmrig family
-
OnlyLogger payload
-
Vidar Stealer
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1