General
-
Target
bc4a269ef127d108659149b6058ac7d8_JaffaCakes118
-
Size
348KB
-
Sample
241203-h5p8zs1kfl
-
MD5
bc4a269ef127d108659149b6058ac7d8
-
SHA1
6e92d9c37f2325a6937a3416b1084fa6cbbfa0b9
-
SHA256
d59141259753d70802bc521e85bd4226174ef73871aee39dc4d763290c33281f
-
SHA512
2baf73f8860247a6ac352742e4abed159c20ccde2cdabf5dcbe509843b821e90c149fcf9f841e35d67113561a74729239a896c546ab238f497d193dfc98ed995
-
SSDEEP
6144:9lLhAgl/XxhG1MLAkCg+3K6xW4UisBfkvR8+0Pn28U+3jRdkVNBfH:D9AgF/G1MLAkCg161Un8vR8m+3jqj
Static task
static1
Behavioral task
behavioral1
Sample
bc4a269ef127d108659149b6058ac7d8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bc4a269ef127d108659149b6058ac7d8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
bc4a269ef127d108659149b6058ac7d8_JaffaCakes118
-
Size
348KB
-
MD5
bc4a269ef127d108659149b6058ac7d8
-
SHA1
6e92d9c37f2325a6937a3416b1084fa6cbbfa0b9
-
SHA256
d59141259753d70802bc521e85bd4226174ef73871aee39dc4d763290c33281f
-
SHA512
2baf73f8860247a6ac352742e4abed159c20ccde2cdabf5dcbe509843b821e90c149fcf9f841e35d67113561a74729239a896c546ab238f497d193dfc98ed995
-
SSDEEP
6144:9lLhAgl/XxhG1MLAkCg+3K6xW4UisBfkvR8+0Pn28U+3jRdkVNBfH:D9AgF/G1MLAkCg161Un8vR8m+3jqj
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Locky family
-
Locky_osiris family
-
Deletes itself
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry
-