General
-
Target
JaffaCakes118_76405f0aba384688fddaf31a294f88b8
-
Size
5.1MB
-
Sample
250107-ymnv7sxqgn
-
MD5
76405f0aba384688fddaf31a294f88b8
-
SHA1
97ab2bdce4e1089dce058fbe38cd17fb6f11cc30
-
SHA256
db49ee22aaa915add5f012d2070d32ea2e50c2df78689754903a27430f22bf08
-
SHA512
e6e6a9f51f191682f5f4cdefb8d2a6cbb881d32c8ce18495fd0e4a79f3efdd2106f22d02de6ddcc59fde50a6dc55ee4c2312c21cededa8dcad65d4968e81a2af
-
SSDEEP
98304:q60IvDPNonUKTcfwgrhHwSY6wc7A5wmlcLnR7ck57kccPvJYq+U:q6tLSUacIIhHwS3weOjcjR4okc3BU
Behavioral task
behavioral1
Sample
JaffaCakes118_76405f0aba384688fddaf31a294f88b8.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
JaffaCakes118_76405f0aba384688fddaf31a294f88b8
-
Size
5.1MB
-
MD5
76405f0aba384688fddaf31a294f88b8
-
SHA1
97ab2bdce4e1089dce058fbe38cd17fb6f11cc30
-
SHA256
db49ee22aaa915add5f012d2070d32ea2e50c2df78689754903a27430f22bf08
-
SHA512
e6e6a9f51f191682f5f4cdefb8d2a6cbb881d32c8ce18495fd0e4a79f3efdd2106f22d02de6ddcc59fde50a6dc55ee4c2312c21cededa8dcad65d4968e81a2af
-
SSDEEP
98304:q60IvDPNonUKTcfwgrhHwSY6wc7A5wmlcLnR7ck57kccPvJYq+U:q6tLSUacIIhHwS3weOjcjR4okc3BU
-
Loaderbot family
-
Xmrig family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
LoaderBot executable
-
XMRig Miner payload
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-