General
-
Target
88863861e03c74eb9b3015e95df10475_JaffaCakes118
-
Size
60KB
-
Sample
241102-3x67rayglg
-
MD5
88863861e03c74eb9b3015e95df10475
-
SHA1
e4b6a008352c6cf89499d484da3646e105a5e3bc
-
SHA256
3b4f7181d275f3a1551fb024f6d054f01a565291d7739741c4278a0d26e00ebd
-
SHA512
61c1b78c24bc46469f3d68160225ba24d175a334319481a16b57e19ead92d8cee105ea5e41e061921e50f59e742991d2ba213f12222a1c511ae471135d77a9ca
-
SSDEEP
768:TOucKn7n1JGDtANIUD75SGLDwUzc80gmq3oP/oDl:TO2GDtAPD/r/0O8/oh
Static task
static1
Behavioral task
behavioral1
Sample
88863861e03c74eb9b3015e95df10475_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
88863861e03c74eb9b3015e95df10475_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
88863861e03c74eb9b3015e95df10475_JaffaCakes118
-
Size
60KB
-
MD5
88863861e03c74eb9b3015e95df10475
-
SHA1
e4b6a008352c6cf89499d484da3646e105a5e3bc
-
SHA256
3b4f7181d275f3a1551fb024f6d054f01a565291d7739741c4278a0d26e00ebd
-
SHA512
61c1b78c24bc46469f3d68160225ba24d175a334319481a16b57e19ead92d8cee105ea5e41e061921e50f59e742991d2ba213f12222a1c511ae471135d77a9ca
-
SSDEEP
768:TOucKn7n1JGDtANIUD75SGLDwUzc80gmq3oP/oDl:TO2GDtAPD/r/0O8/oh
-
Nitro family
-
Renames multiple (96) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-