General
-
Target
e52f6985588dcf37d05e048a45ea19c1_JaffaCakes118
-
Size
61KB
-
Sample
241212-hlbaqatmew
-
MD5
e52f6985588dcf37d05e048a45ea19c1
-
SHA1
c4eae2eb74150016b2825465cc2476b3f6bfdfc8
-
SHA256
55eea810979f5dc33f1507e5e544eec144dd11b73773d515a8ba22ae46ba4af2
-
SHA512
9333232f4bb6a9ca6d7cdb3edf6523fb6b995ee58d40818e556ec75d2a795d443c8f5d1a6e64ae6640dd0e4700e87509a764a83e561e014df302904f0a88e610
-
SSDEEP
768:WKsMqCXfVcWlQM9ZkiANIULTYLDwUzc80gmq3oP/oDi:WKseSM9ZkiAPQr/0O8/oG
Static task
static1
Behavioral task
behavioral1
Sample
e52f6985588dcf37d05e048a45ea19c1_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e52f6985588dcf37d05e048a45ea19c1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
e52f6985588dcf37d05e048a45ea19c1_JaffaCakes118
-
Size
61KB
-
MD5
e52f6985588dcf37d05e048a45ea19c1
-
SHA1
c4eae2eb74150016b2825465cc2476b3f6bfdfc8
-
SHA256
55eea810979f5dc33f1507e5e544eec144dd11b73773d515a8ba22ae46ba4af2
-
SHA512
9333232f4bb6a9ca6d7cdb3edf6523fb6b995ee58d40818e556ec75d2a795d443c8f5d1a6e64ae6640dd0e4700e87509a764a83e561e014df302904f0a88e610
-
SSDEEP
768:WKsMqCXfVcWlQM9ZkiANIULTYLDwUzc80gmq3oP/oDi:WKseSM9ZkiAPQr/0O8/oG
-
Nitro family
-
Renames multiple (94) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-