General
-
Target
JaffaCakes118_c884991c01d2854cd2d9b46f792207fc
-
Size
7.3MB
-
Sample
250109-p2ndjszpa1
-
MD5
c884991c01d2854cd2d9b46f792207fc
-
SHA1
3f1549e8aaea2119361caa588d47de42aab0dc47
-
SHA256
914644da1b2f5c041a3199411b353f3c8e5b7e965399ac015bbc6c5286da7a7e
-
SHA512
0fade5bc588ea78f9dc589ca2c1223ae6141e6eae3af92a7d660f5343ebfb798b6de1c6011f52061ef2a2cc29800615420dbaaa68b7fac3f10b6a0a0a6da9669
-
SSDEEP
196608:9dm5Fdkyzf/xH8YRE4iQOr3asgZ9QHfz1afuVClmlB:9gPuybp5E4zO9Rc5ly
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
loaderbot
http://qqpe4eb7.beget.tech/cmd.php
Extracted
redline
@zenvolord
185.209.22.181:29234
-
auth_value
5a0918bd3e8ede8e02c8dd9d106a996d
Targets
-
-
Target
JaffaCakes118_c884991c01d2854cd2d9b46f792207fc
-
Size
7.3MB
-
MD5
c884991c01d2854cd2d9b46f792207fc
-
SHA1
3f1549e8aaea2119361caa588d47de42aab0dc47
-
SHA256
914644da1b2f5c041a3199411b353f3c8e5b7e965399ac015bbc6c5286da7a7e
-
SHA512
0fade5bc588ea78f9dc589ca2c1223ae6141e6eae3af92a7d660f5343ebfb798b6de1c6011f52061ef2a2cc29800615420dbaaa68b7fac3f10b6a0a0a6da9669
-
SSDEEP
196608:9dm5Fdkyzf/xH8YRE4iQOr3asgZ9QHfz1afuVClmlB:9gPuybp5E4zO9Rc5ly
-
Loaderbot family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
XMRig Miner payload
-
Xmrig family
-
LoaderBot executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-