General
-
Target
ecb5faaf15a75e66857d0cdfe936c45e_JaffaCakes118
-
Size
61KB
-
Sample
241213-wljhzswpgv
-
MD5
ecb5faaf15a75e66857d0cdfe936c45e
-
SHA1
2a6b69c095963a76b29b78509d58f586a5c0ee68
-
SHA256
6546f0638160cb590b4ead2401fb55d48e10b2ee1808ff0354fff52c9e2f62bf
-
SHA512
bdbd9e290d443314b255b183610c4d7ab4fcd783d008f1506636ffe2163f749f0624426239e2f842b3308df84f103154d531f33503eae74a873c197651c25125
-
SSDEEP
768:wKsMqCXfVcWMHM9ZkiANIUZBOYLDwUzc80gmq3oP/oDe:wKse0M9ZkiAPZ9r/0O8/oy
Static task
static1
Behavioral task
behavioral1
Sample
ecb5faaf15a75e66857d0cdfe936c45e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecb5faaf15a75e66857d0cdfe936c45e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ecb5faaf15a75e66857d0cdfe936c45e_JaffaCakes118
-
Size
61KB
-
MD5
ecb5faaf15a75e66857d0cdfe936c45e
-
SHA1
2a6b69c095963a76b29b78509d58f586a5c0ee68
-
SHA256
6546f0638160cb590b4ead2401fb55d48e10b2ee1808ff0354fff52c9e2f62bf
-
SHA512
bdbd9e290d443314b255b183610c4d7ab4fcd783d008f1506636ffe2163f749f0624426239e2f842b3308df84f103154d531f33503eae74a873c197651c25125
-
SSDEEP
768:wKsMqCXfVcWMHM9ZkiANIUZBOYLDwUzc80gmq3oP/oDe:wKse0M9ZkiAPZ9r/0O8/oy
-
Nitro family
-
Renames multiple (83) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-