2017-05-15 - THE JAFF RANSOMWARE TRAIN KEEPS ON ROLLIN'

NOTICE:

ASSOCIATED FILES:

  • 2017-05-15-Jaff-ransomware-traffic.pcap   (158,549 bytes)
  • 2017-05-15-Jaff-ransomware-malspam-1035-UTC.eml   (72,864 bytes)
  • 001_8378.pdf   (53,257 bytes)
  • 2017-05-15-Jaff-decryptor-index.css   (2,661 bytes)
  • 2017-05-15-Jaff-decryptor.html   (5091 bytes)
  • 2017-05-15-Jaff-ransomware-ReadMe.bmp   (3,145,782 bytes)
  • 2017-05-15-Jaff-ransomware-ReadMe.html   (1,431 bytes)
  • 2017-05-15-Jaff-ransomware-ReadMe.txt   (482 bytes)
  • 2017-05-15-Jaff-ransomware-drefudre20.exe   (176,128 bytes)
  • HHU67.docm   (55,129 bytes)

NOTES:

 

EMAIL


Shown above:  An example of the emails.

 

EMAIL HEADERS:

 

MALWARE


Shown above:  The PDF attachment contains an embedded Word document with malicious macros.

 

ATTACHMENT:

EMBEDDED WORD DOCUMENT:

JAFF RANSOMWARE:

 

TRAFFIC

URLS FROM THE WORD MACROS TO DOWNLOAD JAFF RANSOMWARE:

 

JAFF RANSOMWARE POST-INFECTION TRAFFIC:

 


Traffic from the infection filtered in Wireshark.

 


HTTP request for the Jaff ransomware.

 


Post-infection traffic from the infected Windows host.

 

IMAGES


Shown above:  Desktop of an infected Windows host.

 


Shown above:  Going to the Jaff Decryptor.

 

FINAL NOTES

Click here to return to the main page.