General
-
Target
JaffaCakes118_8d56d00ad730a23120a212117c8b51c6
-
Size
3.5MB
-
Sample
250108-fx196swjax
-
MD5
8d56d00ad730a23120a212117c8b51c6
-
SHA1
a81a3742c0958a058228dfb7255d55bde70e9a52
-
SHA256
5d86482c0ce206a289fe78c9e455c4fbab8a1268feb24a40812f972a4b988dfc
-
SHA512
63020442ad9fb0ab1f96981c845759382939e5fb61a56456b8f2460d61bdface11e5b163d24a3e87d44fa4005dc0e335217f7e7459bffe3af1ac27bc51c12629
-
SSDEEP
98304:JDgLBluDfg9t3hOpvKHXOhczp0fC6bSRcJ:JDSHSg9t30pvQXkwiCjs
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8d56d00ad730a23120a212117c8b51c6.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8d56d00ad730a23120a212117c8b51c6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
nullmixer
http://mooorni.xyz/
Extracted
privateloader
http://45.133.1.107/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
Extracted
redline
fucker2
135.181.129.119:4805
-
auth_value
b69102cdbd4afe2d3159f88fb6dac731
Extracted
redline
Chris
194.104.136.5:46013
-
auth_value
9491a1c5e11eb6097e68a4fa8627fda8
Extracted
redline
media21
91.121.67.60:2151
-
auth_value
e37d5065561884bb54c8ed1baa6de446
Extracted
gcleaner
gcl-gb.biz
45.9.20.13
Targets
-
-
Target
JaffaCakes118_8d56d00ad730a23120a212117c8b51c6
-
Size
3.5MB
-
MD5
8d56d00ad730a23120a212117c8b51c6
-
SHA1
a81a3742c0958a058228dfb7255d55bde70e9a52
-
SHA256
5d86482c0ce206a289fe78c9e455c4fbab8a1268feb24a40812f972a4b988dfc
-
SHA512
63020442ad9fb0ab1f96981c845759382939e5fb61a56456b8f2460d61bdface11e5b163d24a3e87d44fa4005dc0e335217f7e7459bffe3af1ac27bc51c12629
-
SSDEEP
98304:JDgLBluDfg9t3hOpvKHXOhczp0fC6bSRcJ:JDSHSg9t30pvQXkwiCjs
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
OnlyLogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
setup_installer.exe
-
Size
3.5MB
-
MD5
fc3533e313c49ffe6437e82a2c619d7e
-
SHA1
1778cc5277b8b7691fee1a70f3202fdc12c9f233
-
SHA256
87b0c1c46b84d57c0255929e6599bf70bcd76d9d9db47d70c65b764c7f4c90b7
-
SHA512
06f51c5972dae3775fac8aa3e0af0ecc87702c620fb82baafc287189e671a3f35d59f4c2dde6332394324b43db1afe57915ccd06037a5bb511ce8db0b3bcfa98
-
SSDEEP
98304:xoCvLUBsgYoi8MssUe5imt854EMhM7DLPwQLF:x1LUCg3tMssVFtY4E3HbwsF
-
Detect Fabookie payload
-
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
Onlylogger family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
OnlyLogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1