General

  • Target

    305fb326b1906e92a4c31f5c64825cef_JaffaCakes118

  • Size

    330KB

  • Sample

    240510-wq19ladd89

  • MD5

    305fb326b1906e92a4c31f5c64825cef

  • SHA1

    f6948a54ebb7d5a9967e48522f7f427a15911ebb

  • SHA256

    4c663be2abf9417d8160f68982f0d8b9907afdcc51838e72185a8f7738f99e51

  • SHA512

    d1f7ccb092051292bfe84d94ffd78789e8fcf6ac910ad0321a5edbc07f187b06f38ab3bea2304f7e52d6e63dc05f09234f1da84df1aa0f0785b87e3474f4718b

  • SSDEEP

    6144:7apl2BRuSZIGjF19erC8cGP3ry/IstViG3t7l:m2BRFtorc4UIstVV3t7l

Malware Config

Targets

    • Target

      305fb326b1906e92a4c31f5c64825cef_JaffaCakes118

    • Size

      330KB

    • MD5

      305fb326b1906e92a4c31f5c64825cef

    • SHA1

      f6948a54ebb7d5a9967e48522f7f427a15911ebb

    • SHA256

      4c663be2abf9417d8160f68982f0d8b9907afdcc51838e72185a8f7738f99e51

    • SHA512

      d1f7ccb092051292bfe84d94ffd78789e8fcf6ac910ad0321a5edbc07f187b06f38ab3bea2304f7e52d6e63dc05f09234f1da84df1aa0f0785b87e3474f4718b

    • SSDEEP

      6144:7apl2BRuSZIGjF19erC8cGP3ry/IstViG3t7l:m2BRFtorc4UIstVV3t7l

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Locky (Osiris variant)

      Variant of the Locky ransomware seen in the wild since early 2017.

    • Deletes itself

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Impact

Defacement

1
T1491

Tasks