General
-
Target
JaffaCakes118_d8f03daa4389b4e6ce37a3d3664e74f5
-
Size
6.3MB
-
Sample
250110-da81ds1rgq
-
MD5
d8f03daa4389b4e6ce37a3d3664e74f5
-
SHA1
9f044353923afec678d50777e8dc2e18a4b5ce21
-
SHA256
d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6
-
SHA512
4ea37e044be69b88c53f7bdecd0eb5c431fc3f112bd1cfd53942463756cd3187a3a5a2ead9a4ea82f6fc323213a17b9231d6ce9493f68cfe71aac250121a99f9
-
SSDEEP
98304:+Pdx/6o/EJ6N6ExIxrnumYqN2nup/iRfigVs/DHDVhGBL341RTY9Wi6NuToaBOqj:+L6ocnTSR1eP4IFYLXToa8ta/9QH6Q9m
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d8f03daa4389b4e6ce37a3d3664e74f5.exe
Resource
win7-20241010-en
Malware Config
Extracted
cryptbot
veowvf15.top
morysl01.top
-
payload_url
http://tyngle01.top/download.php?file=lv.exe
Targets
-
-
Target
JaffaCakes118_d8f03daa4389b4e6ce37a3d3664e74f5
-
Size
6.3MB
-
MD5
d8f03daa4389b4e6ce37a3d3664e74f5
-
SHA1
9f044353923afec678d50777e8dc2e18a4b5ce21
-
SHA256
d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6
-
SHA512
4ea37e044be69b88c53f7bdecd0eb5c431fc3f112bd1cfd53942463756cd3187a3a5a2ead9a4ea82f6fc323213a17b9231d6ce9493f68cfe71aac250121a99f9
-
SSDEEP
98304:+Pdx/6o/EJ6N6ExIxrnumYqN2nup/iRfigVs/DHDVhGBL341RTY9Wi6NuToaBOqj:+L6ocnTSR1eP4IFYLXToa8ta/9QH6Q9m
-
Babadeda Crypter
-
Babadeda family
-
Cryptbot family
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2