General

  • Target

    JaffaCakes118_76405f0aba384688fddaf31a294f88b8

  • Size

    5.1MB

  • Sample

    250107-ymnv7sxqgn

  • MD5

    76405f0aba384688fddaf31a294f88b8

  • SHA1

    97ab2bdce4e1089dce058fbe38cd17fb6f11cc30

  • SHA256

    db49ee22aaa915add5f012d2070d32ea2e50c2df78689754903a27430f22bf08

  • SHA512

    e6e6a9f51f191682f5f4cdefb8d2a6cbb881d32c8ce18495fd0e4a79f3efdd2106f22d02de6ddcc59fde50a6dc55ee4c2312c21cededa8dcad65d4968e81a2af

  • SSDEEP

    98304:q60IvDPNonUKTcfwgrhHwSY6wc7A5wmlcLnR7ck57kccPvJYq+U:q6tLSUacIIhHwS3weOjcjR4okc3BU

Malware Config

Targets

    • Target

      JaffaCakes118_76405f0aba384688fddaf31a294f88b8

    • Size

      5.1MB

    • MD5

      76405f0aba384688fddaf31a294f88b8

    • SHA1

      97ab2bdce4e1089dce058fbe38cd17fb6f11cc30

    • SHA256

      db49ee22aaa915add5f012d2070d32ea2e50c2df78689754903a27430f22bf08

    • SHA512

      e6e6a9f51f191682f5f4cdefb8d2a6cbb881d32c8ce18495fd0e4a79f3efdd2106f22d02de6ddcc59fde50a6dc55ee4c2312c21cededa8dcad65d4968e81a2af

    • SSDEEP

      98304:q60IvDPNonUKTcfwgrhHwSY6wc7A5wmlcLnR7ck57kccPvJYq+U:q6tLSUacIIhHwS3weOjcjR4okc3BU

    • LoaderBot

      LoaderBot is a loader written in .NET downloading and executing miners.

    • Loaderbot family

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • LoaderBot executable

    • XMRig Miner payload

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks