General
-
Target
e51038570d307a474c11dad48a5503c2_JaffaCakes118
-
Size
4.3MB
-
Sample
241212-gyzy6ssrc1
-
MD5
e51038570d307a474c11dad48a5503c2
-
SHA1
ad6d23e0da5e05cac857111ce376d8cf6b46930a
-
SHA256
65624215e9613e4922c32eb184b75ea1334a6a2fa32d45ef535918ef7b9a9eca
-
SHA512
f8c918300375d63b46cc580827fe0bbdcaafd2ea51fffc134a10b97f8791d63da3063a4ba1cf6eb381ec63e41c4248bc354743348c9da8ece475f8b0eb3c5cd5
-
SSDEEP
98304:xmCvLUBsgyLBZwCOMWjybulF9e+9SYQKYQddJopOQAj1xS:xPLUCgyt2CP2F97QsJoUrS
Static task
static1
Behavioral task
behavioral1
Sample
e51038570d307a474c11dad48a5503c2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e51038570d307a474c11dad48a5503c2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
nullmixer
http://marisana.xyz/
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.fcektsy.top/
Extracted
redline
Build1
45.142.213.135:30058
Targets
-
-
Target
e51038570d307a474c11dad48a5503c2_JaffaCakes118
-
Size
4.3MB
-
MD5
e51038570d307a474c11dad48a5503c2
-
SHA1
ad6d23e0da5e05cac857111ce376d8cf6b46930a
-
SHA256
65624215e9613e4922c32eb184b75ea1334a6a2fa32d45ef535918ef7b9a9eca
-
SHA512
f8c918300375d63b46cc580827fe0bbdcaafd2ea51fffc134a10b97f8791d63da3063a4ba1cf6eb381ec63e41c4248bc354743348c9da8ece475f8b0eb3c5cd5
-
SSDEEP
98304:xmCvLUBsgyLBZwCOMWjybulF9e+9SYQKYQddJopOQAj1xS:xPLUCgyt2CP2F97QsJoUrS
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Socelars family
-
Socelars payload
-
Vidar family
-
Xmrig family
-
Vidar Stealer
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2