General
-
Target
JaffaCakes118_cd2fb5e01efc04746099cfbc0b5b37c8
-
Size
527KB
-
Sample
250109-vaxqssxjcq
-
MD5
cd2fb5e01efc04746099cfbc0b5b37c8
-
SHA1
123b81d51d47f3f49eaa8f068e7f79773d799497
-
SHA256
0817ae08c918d42b35b03fdb36e8b51237a44b27db5599771bd52e952c5ded3a
-
SHA512
42afcd76db2fd24ed4b8ce1e11b453abf17d4020aad694dbbad49ae53ef1e392a59a0af18bd6afe19757365028bf00026eb8e91b69abe4844d809a8af6617b3e
-
SSDEEP
6144:m9X0GPt/p90FOKWU3TDPTuU4ldQZ7OTcaYEQSh9Ty0y6c4H3yEDFDQMb6Ph0VA4x:I02PWw9C6hlSZ6g2G0yKHp1VbWabfBnB
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_cd2fb5e01efc04746099cfbc0b5b37c8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_cd2fb5e01efc04746099cfbc0b5b37c8.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_cd2fb5e01efc04746099cfbc0b5b37c8
-
Size
527KB
-
MD5
cd2fb5e01efc04746099cfbc0b5b37c8
-
SHA1
123b81d51d47f3f49eaa8f068e7f79773d799497
-
SHA256
0817ae08c918d42b35b03fdb36e8b51237a44b27db5599771bd52e952c5ded3a
-
SHA512
42afcd76db2fd24ed4b8ce1e11b453abf17d4020aad694dbbad49ae53ef1e392a59a0af18bd6afe19757365028bf00026eb8e91b69abe4844d809a8af6617b3e
-
SSDEEP
6144:m9X0GPt/p90FOKWU3TDPTuU4ldQZ7OTcaYEQSh9Ty0y6c4H3yEDFDQMb6Ph0VA4x:I02PWw9C6hlSZ6g2G0yKHp1VbWabfBnB
-
Osiris family
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious use of SetThreadContext
-