General
-
Target
JaffaCakes118_3e9b93cd8a81772cf96b53bca62624b9
-
Size
4.3MB
-
Sample
250106-2latqs1mav
-
MD5
3e9b93cd8a81772cf96b53bca62624b9
-
SHA1
198d41dca224a3010589f2ce0a9cac6686dda963
-
SHA256
ffe21af6accb27ecee7c5fae57211ff9f545e64b680059b4037596288c63920b
-
SHA512
0825ab57cfa72b281a8543945cb0128504a6a51479a333ad1d4e88d1edf9a22fe58dd5696e8484a8cd08a0ef4ce2d7deedd5c4e98530a7cbc5c2320989925632
-
SSDEEP
98304:JjzQoMAXPmuTOQVdH/3RLSsKyBlF7AAY4R48OTA2JlwM+CMpgi:JXQoMAf7TzL5mNyJAAYXXwM+Ei
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3e9b93cd8a81772cf96b53bca62624b9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3e9b93cd8a81772cf96b53bca62624b9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
nullmixer
http://marianu.xyz/
Extracted
privateloader
http://45.133.1.107/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.efxety.top/
Extracted
redline
ChrisNEW
194.104.136.5:46013
-
auth_value
9491a1c5e11eb6097e68a4fa8627fda8
Extracted
gcleaner
gcl-gb.biz
45.9.20.13
Targets
-
-
Target
JaffaCakes118_3e9b93cd8a81772cf96b53bca62624b9
-
Size
4.3MB
-
MD5
3e9b93cd8a81772cf96b53bca62624b9
-
SHA1
198d41dca224a3010589f2ce0a9cac6686dda963
-
SHA256
ffe21af6accb27ecee7c5fae57211ff9f545e64b680059b4037596288c63920b
-
SHA512
0825ab57cfa72b281a8543945cb0128504a6a51479a333ad1d4e88d1edf9a22fe58dd5696e8484a8cd08a0ef4ce2d7deedd5c4e98530a7cbc5c2320989925632
-
SSDEEP
98304:JjzQoMAXPmuTOQVdH/3RLSsKyBlF7AAY4R48OTA2JlwM+CMpgi:JXQoMAf7TzL5mNyJAAYXXwM+Ei
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Socelars family
-
Socelars payload
-
OnlyLogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
-
-
Target
setup_installer.exe
-
Size
4.3MB
-
MD5
c12fe256228c8c0403ef35279aca6f58
-
SHA1
840a4eaf832f3cd154f0766dbc415a32c181e200
-
SHA256
86271c0587581b77766414a1238238011c10a5a06255b4611ac3b058f4529c2b
-
SHA512
88689761f0eeedc4ff633744dab15b26ad7352bda1f0329ed920dce463118ea11a14249cfd636aa3d39dbdabbcb1342138b7b5255a3791faf8ad955c63f5ff11
-
SSDEEP
98304:xRCvLUBsgElXqpZspVj14x8YkF1SUBBrttz1hNOtlVYgb:x6LUCgEBqpZFO9PttzM/h
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Socelars family
-
Socelars payload
-
OnlyLogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1