General
-
Target
JaffaCakes118_49ad58b15a86127a570834164851a3df1132e2ec578b2f6bc1c5185aab7ca7a7
-
Size
8.0MB
-
Sample
241221-x9zesaxmh1
-
MD5
c94a01b4621d2b7b6517525fe8a4f24e
-
SHA1
b3ff6d2ab6a28ec65f366d3cf468190fa34f5aa5
-
SHA256
49ad58b15a86127a570834164851a3df1132e2ec578b2f6bc1c5185aab7ca7a7
-
SHA512
c4767aa2d89831d6cd1e51e2b1e60d056e3f4382632bdfeb0dea82b12a76a40110060f4a2b406bf4c49160fbcc85048ef53b206cbe4118f169b2a65d9ae31447
-
SSDEEP
196608:Jo0aRRNWLwEUZRD63BgMPLGTeLasSz3UIl5HsRTQe9ytdA:Jf7LPKRGBlaqu32ke9yti
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_49ad58b15a86127a570834164851a3df1132e2ec578b2f6bc1c5185aab7ca7a7.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_49ad58b15a86127a570834164851a3df1132e2ec578b2f6bc1c5185aab7ca7a7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
nullmixer
http://624e4f01d3a8d.com/
Extracted
socelars
https://sa-us-bucket.s3.us-east-2.amazonaws.com/vsdh41/
Extracted
smokeloader
pub3
Extracted
gcleaner
31.210.20.149
212.192.241.16
212.192.246.217
203.159.80.49
-
url_path
/software.php
/software.php
Targets
-
-
Target
JaffaCakes118_49ad58b15a86127a570834164851a3df1132e2ec578b2f6bc1c5185aab7ca7a7
-
Size
8.0MB
-
MD5
c94a01b4621d2b7b6517525fe8a4f24e
-
SHA1
b3ff6d2ab6a28ec65f366d3cf468190fa34f5aa5
-
SHA256
49ad58b15a86127a570834164851a3df1132e2ec578b2f6bc1c5185aab7ca7a7
-
SHA512
c4767aa2d89831d6cd1e51e2b1e60d056e3f4382632bdfeb0dea82b12a76a40110060f4a2b406bf4c49160fbcc85048ef53b206cbe4118f169b2a65d9ae31447
-
SSDEEP
196608:Jo0aRRNWLwEUZRD63BgMPLGTeLasSz3UIl5HsRTQe9ytdA:Jf7LPKRGBlaqu32ke9yti
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Smokeloader family
-
Socelars family
-
Socelars payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
setup_installer.exe
-
Size
8.0MB
-
MD5
d79f4e5eceee0a9b3645514cc509098b
-
SHA1
474424ce06fbfc3c5fdcb875aecf81914e2916b6
-
SHA256
f5edf6fa082dbb5d2c78faf436fbc3d44df12e7edf3a7d9c4f144f400be89ebb
-
SHA512
37db11efa0662221014f228d71fd9f226bae68522a8525e0d05fcd4cc5ffa75cac491e72853020ea4e83077dc5a3169c29b60b73633e11fb1da5657be5142acc
-
SSDEEP
196608:x9fjrq8ySlNVV/fQocAKLBuqI/O/d9iBANQOnLuO3vXhBijG:xhjrq3SlzFfPcAWBHTiMQ/+PDiq
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Smokeloader family
-
Socelars family
-
Socelars payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1