General

  • Target

    JaffaCakes118_cd2fb5e01efc04746099cfbc0b5b37c8

  • Size

    527KB

  • Sample

    250109-vaxqssxjcq

  • MD5

    cd2fb5e01efc04746099cfbc0b5b37c8

  • SHA1

    123b81d51d47f3f49eaa8f068e7f79773d799497

  • SHA256

    0817ae08c918d42b35b03fdb36e8b51237a44b27db5599771bd52e952c5ded3a

  • SHA512

    42afcd76db2fd24ed4b8ce1e11b453abf17d4020aad694dbbad49ae53ef1e392a59a0af18bd6afe19757365028bf00026eb8e91b69abe4844d809a8af6617b3e

  • SSDEEP

    6144:m9X0GPt/p90FOKWU3TDPTuU4ldQZ7OTcaYEQSh9Ty0y6c4H3yEDFDQMb6Ph0VA4x:I02PWw9C6hlSZ6g2G0yKHp1VbWabfBnB

Malware Config

Targets

    • Target

      JaffaCakes118_cd2fb5e01efc04746099cfbc0b5b37c8

    • Size

      527KB

    • MD5

      cd2fb5e01efc04746099cfbc0b5b37c8

    • SHA1

      123b81d51d47f3f49eaa8f068e7f79773d799497

    • SHA256

      0817ae08c918d42b35b03fdb36e8b51237a44b27db5599771bd52e952c5ded3a

    • SHA512

      42afcd76db2fd24ed4b8ce1e11b453abf17d4020aad694dbbad49ae53ef1e392a59a0af18bd6afe19757365028bf00026eb8e91b69abe4844d809a8af6617b3e

    • SSDEEP

      6144:m9X0GPt/p90FOKWU3TDPTuU4ldQZ7OTcaYEQSh9Ty0y6c4H3yEDFDQMb6Ph0VA4x:I02PWw9C6hlSZ6g2G0yKHp1VbWabfBnB

    • Osiris family

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks