General
-
Target
a382153ad18d0c95006b5c4c197efca5_JaffaCakes118
-
Size
61KB
-
Sample
241126-xcyrzszqak
-
MD5
a382153ad18d0c95006b5c4c197efca5
-
SHA1
6f8b2a57b75d20c2c9707dfe8e3c0a2c8a1380c5
-
SHA256
85de0898ff39ffa8fce097fa675551106ec38e47c93dfc8cd2d35f460a0d9eac
-
SHA512
703eb3fc51ae49576d9055335af1495ed0b4d4c01b7c2ad5952dd127f882df21eb88d3c7bad4cea2478399b79c8485b13011324b88593c0517c7f0178f356e74
-
SSDEEP
768:vnmqruBPuQDuKZBQA0KadVR2LDwUzc80gmq3oP/oDn:vncTpO74r/0O8/oD
Static task
static1
Behavioral task
behavioral1
Sample
a382153ad18d0c95006b5c4c197efca5_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a382153ad18d0c95006b5c4c197efca5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
a382153ad18d0c95006b5c4c197efca5_JaffaCakes118
-
Size
61KB
-
MD5
a382153ad18d0c95006b5c4c197efca5
-
SHA1
6f8b2a57b75d20c2c9707dfe8e3c0a2c8a1380c5
-
SHA256
85de0898ff39ffa8fce097fa675551106ec38e47c93dfc8cd2d35f460a0d9eac
-
SHA512
703eb3fc51ae49576d9055335af1495ed0b4d4c01b7c2ad5952dd127f882df21eb88d3c7bad4cea2478399b79c8485b13011324b88593c0517c7f0178f356e74
-
SSDEEP
768:vnmqruBPuQDuKZBQA0KadVR2LDwUzc80gmq3oP/oDn:vncTpO74r/0O8/oD
-
Nitro family
-
Renames multiple (83) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-