General
-
Target
f740927dd70b9818939d1d19f3860b0e_JaffaCakes118
-
Size
584KB
-
Sample
240418-exv8gsca9z
-
MD5
f740927dd70b9818939d1d19f3860b0e
-
SHA1
12ced3422c532a16822511219afd630335dd4e99
-
SHA256
2466b0d75b3a043f2b0f341e7eb9a67612b230228543473dfd7a663338f0688e
-
SHA512
3f9294bdcc281f4380d0f403c47b460ed84e996ce61fedf1d17817adeb0966532809f3f9d4a8171f35b3353cddf33b0eb0f2b74e2b109db24ee3a958b8b1374d
-
SSDEEP
12288:bXe9PPlowWX0t6mOQwg1Qd15CcYk0We1trlfi6HA7nu9Ffd4:ihloDX0XOf4JfieA6V4
Behavioral task
behavioral1
Sample
f740927dd70b9818939d1d19f3860b0e_JaffaCakes118.exe
Resource
win7-20240215-en
Malware Config
Extracted
lokibot
http://abrokenskull.gq/Office1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
f740927dd70b9818939d1d19f3860b0e_JaffaCakes118
-
Size
584KB
-
MD5
f740927dd70b9818939d1d19f3860b0e
-
SHA1
12ced3422c532a16822511219afd630335dd4e99
-
SHA256
2466b0d75b3a043f2b0f341e7eb9a67612b230228543473dfd7a663338f0688e
-
SHA512
3f9294bdcc281f4380d0f403c47b460ed84e996ce61fedf1d17817adeb0966532809f3f9d4a8171f35b3353cddf33b0eb0f2b74e2b109db24ee3a958b8b1374d
-
SSDEEP
12288:bXe9PPlowWX0t6mOQwg1Qd15CcYk0We1trlfi6HA7nu9Ffd4:ihloDX0XOf4JfieA6V4
-
Accesses Microsoft Outlook profiles
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-