General
-
Target
cceff411feab78a02a22744e2eae9ab8_JaffaCakes118
-
Size
3.9MB
-
Sample
241206-pdd5zasnfp
-
MD5
cceff411feab78a02a22744e2eae9ab8
-
SHA1
7b707ac1bfcc7bdd5439c606af91a5dc5a499493
-
SHA256
cfdcbcca4f75f287d6389cda895571530ddb9a2bbdf54cce52c1c65e969ac0a3
-
SHA512
0eb9732143fbd7816951acf72bcbf10218a58a4780958b9a57e2d6960781296f73e8f1c0f0262adbb95d855a92e136d87e3e01bea8497d9a8a3e5afa41b3115c
-
SSDEEP
98304:yLKnNSD/lKELv/i+b0kdcldi1culG9hOAsXl6Ctf9I0ineqI01YO:yB/Q0HFXdczrulG9hO7XBS0inH1YO
Static task
static1
Behavioral task
behavioral1
Sample
cceff411feab78a02a22744e2eae9ab8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cceff411feab78a02a22744e2eae9ab8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
nullmixer
http://watira.xyz/
Extracted
redline
Build1
45.142.213.135:30058
Targets
-
-
Target
cceff411feab78a02a22744e2eae9ab8_JaffaCakes118
-
Size
3.9MB
-
MD5
cceff411feab78a02a22744e2eae9ab8
-
SHA1
7b707ac1bfcc7bdd5439c606af91a5dc5a499493
-
SHA256
cfdcbcca4f75f287d6389cda895571530ddb9a2bbdf54cce52c1c65e969ac0a3
-
SHA512
0eb9732143fbd7816951acf72bcbf10218a58a4780958b9a57e2d6960781296f73e8f1c0f0262adbb95d855a92e136d87e3e01bea8497d9a8a3e5afa41b3115c
-
SSDEEP
98304:yLKnNSD/lKELv/i+b0kdcldi1culG9hOAsXl6Ctf9I0ineqI01YO:yB/Q0HFXdczrulG9hO7XBS0inH1YO
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Vidar family
-
Xmrig family
-
Vidar Stealer
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
setup_installer.exe
-
Size
3.9MB
-
MD5
3394285ab7e1ef48bc775f71ed7b0a76
-
SHA1
646fadf1a0a0dafe07319c86de0587ed96a0fc2b
-
SHA256
732b086183981289f4dff07f2054fa1356bba8d975359e2f40b6f1adae084467
-
SHA512
31d754a5f0f005eaf18eed0bd021e2c3698935dd51b10e7c21d4236abe875faf9945aad12e8711da9e42952ab586adf4c98f4a3d6db48e00ab53bb02b7258dc8
-
SSDEEP
98304:xWCvLUBsgUhDskhlxVOIRNa28BBF4VQMGXB9UpWib:xfLUCgUhDskhlDO28fTAtb
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Vidar family
-
Xmrig family
-
Vidar Stealer
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1