General

  • Target

    JaffaCakes118_e3b965382ed72035e4d46cf53f44dd3f2146ec96cd0838ecb8576cc404293cc9

  • Size

    796KB

  • Sample

    241225-qw1mcstqgy

  • MD5

    6eeac2d35e80994362ed079c11db5c81

  • SHA1

    04008758fbc4a294fc8351a6fa1b10870d97afc9

  • SHA256

    e3b965382ed72035e4d46cf53f44dd3f2146ec96cd0838ecb8576cc404293cc9

  • SHA512

    e372b6b7b24d409fc93cc257889c85e4cf72e1340d98ac24b64ad983c8d63929ea7d55b4cfbd9300523a198f18caf08746556bcfbc853bef1a1da2f609e3f379

  • SSDEEP

    24576:4G0N+xjC15Vdj4E/gA2AUOfrFQpbswwwwwYs82ugb3tdvE:d0N+xjC1Ddj4E/rHFQpbswwwwwYszuyI

Malware Config

Targets

    • Target

      JaffaCakes118_e3b965382ed72035e4d46cf53f44dd3f2146ec96cd0838ecb8576cc404293cc9

    • Size

      796KB

    • MD5

      6eeac2d35e80994362ed079c11db5c81

    • SHA1

      04008758fbc4a294fc8351a6fa1b10870d97afc9

    • SHA256

      e3b965382ed72035e4d46cf53f44dd3f2146ec96cd0838ecb8576cc404293cc9

    • SHA512

      e372b6b7b24d409fc93cc257889c85e4cf72e1340d98ac24b64ad983c8d63929ea7d55b4cfbd9300523a198f18caf08746556bcfbc853bef1a1da2f609e3f379

    • SSDEEP

      24576:4G0N+xjC15Vdj4E/gA2AUOfrFQpbswwwwwYs82ugb3tdvE:d0N+xjC1Ddj4E/rHFQpbswwwwwYszuyI

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks