General
-
Target
JaffaCakes118_c29c49f54236b95c5f6228af66c651c5
-
Size
2.7MB
-
Sample
250109-jk1dwstlfy
-
MD5
c29c49f54236b95c5f6228af66c651c5
-
SHA1
92c2a13c39757b0b656b44e0d1bc55e98ed5cc00
-
SHA256
0218dd62759681af9aa77bfbd8f43af8de695b7426bb74aecdcd9f25ee53f3da
-
SHA512
4fd926d42951e3e29a9d7a78b787567d86a5ae01a5bdcbf56058dc61a86d71d6b7bf4254a6136e9844cf2530f1a9bb5f645b40e804cc1cc2602d89bf193a505d
-
SSDEEP
49152:P9eUwdL4wRqh7YqAVpymthcNRhuvo5NMAN7q4HmfT5RhJRr0UUK81Ezw6HdPd5ik:85zgSt+svYNMAN7jOhJRDrwId
Behavioral task
behavioral1
Sample
JaffaCakes118_c29c49f54236b95c5f6228af66c651c5.exe
Resource
win7-20241010-en
Malware Config
Extracted
cryptbot
oct3m.top
oct3e.top
Targets
-
-
Target
JaffaCakes118_c29c49f54236b95c5f6228af66c651c5
-
Size
2.7MB
-
MD5
c29c49f54236b95c5f6228af66c651c5
-
SHA1
92c2a13c39757b0b656b44e0d1bc55e98ed5cc00
-
SHA256
0218dd62759681af9aa77bfbd8f43af8de695b7426bb74aecdcd9f25ee53f3da
-
SHA512
4fd926d42951e3e29a9d7a78b787567d86a5ae01a5bdcbf56058dc61a86d71d6b7bf4254a6136e9844cf2530f1a9bb5f645b40e804cc1cc2602d89bf193a505d
-
SSDEEP
49152:P9eUwdL4wRqh7YqAVpymthcNRhuvo5NMAN7q4HmfT5RhJRr0UUK81Ezw6HdPd5ik:85zgSt+svYNMAN7jOhJRDrwId
-
Cryptbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4