General
-
Target
8e6c0da213c278e63ae692a8dafe15e9_JaffaCakes118
-
Size
60KB
-
Sample
241104-blh71aslcj
-
MD5
8e6c0da213c278e63ae692a8dafe15e9
-
SHA1
f8e74cbbb667e0d60699e7b19ce4b688a468f082
-
SHA256
602908a365ea6602535c825d2b7423ecb4a4ce5597b3114be289794a7a54d7ca
-
SHA512
09d7d811aa5d1bf9414417bc6cd5e45758ca0e47e172e8b8c65c16e390d6641a5b59dcb01737425ce840075e81da382cea744bcde185070a862164de92fae3f1
-
SSDEEP
768:POucKn7n1JGDNANIUqLyovLDwUzc80gmq3oP/oDas:PO2GDNAPquer/0O8/oF
Static task
static1
Behavioral task
behavioral1
Sample
8e6c0da213c278e63ae692a8dafe15e9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8e6c0da213c278e63ae692a8dafe15e9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
8e6c0da213c278e63ae692a8dafe15e9_JaffaCakes118
-
Size
60KB
-
MD5
8e6c0da213c278e63ae692a8dafe15e9
-
SHA1
f8e74cbbb667e0d60699e7b19ce4b688a468f082
-
SHA256
602908a365ea6602535c825d2b7423ecb4a4ce5597b3114be289794a7a54d7ca
-
SHA512
09d7d811aa5d1bf9414417bc6cd5e45758ca0e47e172e8b8c65c16e390d6641a5b59dcb01737425ce840075e81da382cea744bcde185070a862164de92fae3f1
-
SSDEEP
768:POucKn7n1JGDNANIUqLyovLDwUzc80gmq3oP/oDas:PO2GDNAPquer/0O8/oF
-
Nitro family
-
Renames multiple (96) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-