General
-
Target
JaffaCakes118_56f3dcaa23c6f1f9fb9178fcf382168773b832236dc2955e24964e0acc6f0884
-
Size
727.6MB
-
Sample
241221-3nw1esvjcp
-
MD5
e8eafc4826f22001b09f5cee3e46e54e
-
SHA1
e66b4001dc5fc5183a78253a649619b815a9c873
-
SHA256
56f3dcaa23c6f1f9fb9178fcf382168773b832236dc2955e24964e0acc6f0884
-
SHA512
e08cf4e23eb3953ceb473f1175602d6ac3d7ab4677f44d971d0bedc7ca0c837acff523f9b78fe28b50d60ba3a9f39410fe4ac348410ddbd3b30d3d826ce02c3d
-
SSDEEP
196608:mTdgDIK/MAVDXme7TshVez4GwrwTT19lGO5A/+:fP/JcWeruJ3
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_56f3dcaa23c6f1f9fb9178fcf382168773b832236dc2955e24964e0acc6f0884.exe
Resource
win7-20241010-en
Malware Config
Extracted
cryptbot
http://kudxoq75.top/gate.php
-
payload_url
http://tamlar10.top/allude.dat
Targets
-
-
Target
JaffaCakes118_56f3dcaa23c6f1f9fb9178fcf382168773b832236dc2955e24964e0acc6f0884
-
Size
727.6MB
-
MD5
e8eafc4826f22001b09f5cee3e46e54e
-
SHA1
e66b4001dc5fc5183a78253a649619b815a9c873
-
SHA256
56f3dcaa23c6f1f9fb9178fcf382168773b832236dc2955e24964e0acc6f0884
-
SHA512
e08cf4e23eb3953ceb473f1175602d6ac3d7ab4677f44d971d0bedc7ca0c837acff523f9b78fe28b50d60ba3a9f39410fe4ac348410ddbd3b30d3d826ce02c3d
-
SSDEEP
196608:mTdgDIK/MAVDXme7TshVez4GwrwTT19lGO5A/+:fP/JcWeruJ3
-
Cryptbot family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2