General

  • Target

    4a2592bc635987fa01678a5eff79cdde_JaffaCakes118

  • Size

    392KB

  • Sample

    240516-j3kq6abh82

  • MD5

    4a2592bc635987fa01678a5eff79cdde

  • SHA1

    f7554f1f50e31080f6dd6946fc3755984ab4993e

  • SHA256

    47f9ce6bbefff2abe7311f6d02196722c95ae080cfb352aea478600a144204e0

  • SHA512

    807fbeb38bf285780a1cdb4dee569a077123fbeb28861738f001334171d6d89b7d30e53546f878cd3eff2e8e0763b92ed0331e59397a013150df13860e7e9d52

  • SSDEEP

    12288:7pNnoX9enkmyy1SHZNZlnb/vMR7EFE9bthaxS8g3n:s9enkmbSHZNrbI7EGwxkn

Malware Config

Targets

    • Target

      4a2592bc635987fa01678a5eff79cdde_JaffaCakes118

    • Size

      392KB

    • MD5

      4a2592bc635987fa01678a5eff79cdde

    • SHA1

      f7554f1f50e31080f6dd6946fc3755984ab4993e

    • SHA256

      47f9ce6bbefff2abe7311f6d02196722c95ae080cfb352aea478600a144204e0

    • SHA512

      807fbeb38bf285780a1cdb4dee569a077123fbeb28861738f001334171d6d89b7d30e53546f878cd3eff2e8e0763b92ed0331e59397a013150df13860e7e9d52

    • SSDEEP

      12288:7pNnoX9enkmyy1SHZNZlnb/vMR7EFE9bthaxS8g3n:s9enkmbSHZNrbI7EGwxkn

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Locky (Osiris variant)

      Variant of the Locky ransomware seen in the wild since early 2017.

    • Deletes itself

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Impact

Defacement

1
T1491

Tasks