General
-
Target
eba2a39642c4b7ce44b43e04056633e8_JaffaCakes118
-
Size
603KB
-
Sample
240410-wasyaaac61
-
MD5
eba2a39642c4b7ce44b43e04056633e8
-
SHA1
92b51c16963653de5e680643fee0e649f4d61ce1
-
SHA256
dfbddd593573d22f463ddb6d75e59aa37dae2b7c130d81fb7a79c57457d7cab8
-
SHA512
c4be4a541cfa74bf386289772e6c93ab38ea1429e55353ad52edc1a04ef21e6420a74207e2cc22c168463bf2e23ab27e163689d91ccc51fab36435994e5594dd
-
SSDEEP
6144:G2DSTd3jw73/t0oBgpXZNa8TJ0ZIvY5OyHpBvyghefeVUTVokQyZGVbQlRxi/7ka:gdO3/XMPT05OyHpBvygTUxiyhoRkz5a
Static task
static1
Behavioral task
behavioral1
Sample
eba2a39642c4b7ce44b43e04056633e8_JaffaCakes118.exe
Resource
win7-20231129-en
Malware Config
Extracted
lokibot
http://pualofficelogs.xyz/gg/bb/yes.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
eba2a39642c4b7ce44b43e04056633e8_JaffaCakes118
-
Size
603KB
-
MD5
eba2a39642c4b7ce44b43e04056633e8
-
SHA1
92b51c16963653de5e680643fee0e649f4d61ce1
-
SHA256
dfbddd593573d22f463ddb6d75e59aa37dae2b7c130d81fb7a79c57457d7cab8
-
SHA512
c4be4a541cfa74bf386289772e6c93ab38ea1429e55353ad52edc1a04ef21e6420a74207e2cc22c168463bf2e23ab27e163689d91ccc51fab36435994e5594dd
-
SSDEEP
6144:G2DSTd3jw73/t0oBgpXZNa8TJ0ZIvY5OyHpBvyghefeVUTVokQyZGVbQlRxi/7ka:gdO3/XMPT05OyHpBvygTUxiyhoRkz5a
-
Executes dropped EXE
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-