General
-
Target
JaffaCakes118_7f0b3b81f856314a816f0c1e193af71d
-
Size
2.6MB
-
Sample
250105-an9x3axjdm
-
MD5
7f0b3b81f856314a816f0c1e193af71d
-
SHA1
a84a152c5211a1f801e868e56f02ff9be52008ef
-
SHA256
cf22bf743239104d52d195763f989fb579de4299a44eaef60ca5c72b6778a8fe
-
SHA512
7b5755e36bce09906e84d3866e3af5a721db95e79052a143fecd33b77e2b0c8475b81a6d0fca2063d9a03a33a090c9f85ccee605c9fc6b0f76668327f214c52b
-
SSDEEP
49152:DRcQaZCpd/o5JYLYXzuG5oXb0rm1bkcI1zLxWSdSL5LyHS7PlVn:DRcpZUSTYezPor0rmtmLfSL5+SLlZ
Behavioral task
behavioral1
Sample
JaffaCakes118_7f0b3b81f856314a816f0c1e193af71d.exe
Resource
win7-20241010-en
Malware Config
Extracted
cryptbot
veorfg11.top
morysl01.top
-
payload_url
http://tyngle01.top/download.php?file=lv.exe
Targets
-
-
Target
JaffaCakes118_7f0b3b81f856314a816f0c1e193af71d
-
Size
2.6MB
-
MD5
7f0b3b81f856314a816f0c1e193af71d
-
SHA1
a84a152c5211a1f801e868e56f02ff9be52008ef
-
SHA256
cf22bf743239104d52d195763f989fb579de4299a44eaef60ca5c72b6778a8fe
-
SHA512
7b5755e36bce09906e84d3866e3af5a721db95e79052a143fecd33b77e2b0c8475b81a6d0fca2063d9a03a33a090c9f85ccee605c9fc6b0f76668327f214c52b
-
SSDEEP
49152:DRcQaZCpd/o5JYLYXzuG5oXb0rm1bkcI1zLxWSdSL5LyHS7PlVn:DRcpZUSTYezPor0rmtmLfSL5+SLlZ
-
Cryptbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2