General
-
Target
JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0
-
Size
2.9MB
-
Sample
250106-vz78tssmht
-
MD5
30a80093ffdd77cb26f2c7558846d5b0
-
SHA1
8dd5e4b51d88e550033377ce26de0e136ee45a4e
-
SHA256
381d92bbafee8c7a8e7b42ce2904812e5f652295eac97a262d7f1ad223eb5168
-
SHA512
f152a76ea4d264b8a184ef9e741e413bef8f219a5f3e38f3be425b168b448fb264f86ff6f99eb766baec03053abb093e7f574983c14ab1d0b2baf76e28b1c69f
-
SSDEEP
49152:D3+/DXxsNB1IS37mzt90YuKYJz1ZYHN5qIE8EBveV5dnVfp3HzI6+75BjvoujHp0:bvBJ37mx98RJot5bEBvK5JVNB+75BjvO
Behavioral task
behavioral1
Sample
JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0.exe
Resource
win7-20240903-en
Malware Config
Extracted
cryptbot
veongt57.top
mornoi05.top
-
payload_url
http://tynqes07.top/download.php?file=zwoag.exe
Targets
-
-
Target
JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0
-
Size
2.9MB
-
MD5
30a80093ffdd77cb26f2c7558846d5b0
-
SHA1
8dd5e4b51d88e550033377ce26de0e136ee45a4e
-
SHA256
381d92bbafee8c7a8e7b42ce2904812e5f652295eac97a262d7f1ad223eb5168
-
SHA512
f152a76ea4d264b8a184ef9e741e413bef8f219a5f3e38f3be425b168b448fb264f86ff6f99eb766baec03053abb093e7f574983c14ab1d0b2baf76e28b1c69f
-
SSDEEP
49152:D3+/DXxsNB1IS37mzt90YuKYJz1ZYHN5qIE8EBveV5dnVfp3HzI6+75BjvoujHp0:bvBJ37mx98RJot5bEBvK5JVNB+75BjvO
-
Cryptbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2