General
-
Target
8ab71e1a19ad7cb1e79fb8b1bc3cab97_JaffaCakes118
-
Size
313KB
-
Sample
241103-k84a5azmd1
-
MD5
8ab71e1a19ad7cb1e79fb8b1bc3cab97
-
SHA1
711473b4cfa62d4d0243c598ef47ce4c481c274d
-
SHA256
b65f63f75a0b88ac2fb0612cf8e2298447e2080b67a2d016b5e6e50c61f1d517
-
SHA512
5cda8dd5de270e3400f21e903b4031d33bcc095b7ace742b7b48cb183692986968022e9cd32463f2390b10c6facca9ae74d16b965b28741a7933930ca343cafb
-
SSDEEP
6144:N7S6tMIBchObFAYh3qqMx9HELXNKQ5m6Rvx:N7SqMIBIIFzQqVbNK9ovx
Static task
static1
Behavioral task
behavioral1
Sample
8ab71e1a19ad7cb1e79fb8b1bc3cab97_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8ab71e1a19ad7cb1e79fb8b1bc3cab97_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
8ab71e1a19ad7cb1e79fb8b1bc3cab97_JaffaCakes118
-
Size
313KB
-
MD5
8ab71e1a19ad7cb1e79fb8b1bc3cab97
-
SHA1
711473b4cfa62d4d0243c598ef47ce4c481c274d
-
SHA256
b65f63f75a0b88ac2fb0612cf8e2298447e2080b67a2d016b5e6e50c61f1d517
-
SHA512
5cda8dd5de270e3400f21e903b4031d33bcc095b7ace742b7b48cb183692986968022e9cd32463f2390b10c6facca9ae74d16b965b28741a7933930ca343cafb
-
SSDEEP
6144:N7S6tMIBchObFAYh3qqMx9HELXNKQ5m6Rvx:N7SqMIBIIFzQqVbNK9ovx
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Locky family
-
Locky_osiris family
-
Deletes itself
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry
-