General
-
Target
fe66ecbd6fd8ab53daf22a4f759ba8fe_JaffaCakes118
-
Size
230KB
-
Sample
240421-er9hxsba5s
-
MD5
fe66ecbd6fd8ab53daf22a4f759ba8fe
-
SHA1
73e04864d4c4d7d402c082c4a6cd9934dd9907cc
-
SHA256
8fde220d40458eceb049d049f5391e8b2ff8f60e49d64d1272602e97d000a742
-
SHA512
6e3039f87dbb24a77bbc4599b33f01f6945e5a5e7f808e99e9fae0be48bc6fcee8cbc35425295dfee1fe60d742f5461975f45abd7369d58afd865b3e6abdce14
-
SSDEEP
3072:7KhRNLktPfWpUDQKsZo9vYCyQw4pa1AfLYPnEpDIEBtK9h1Wi8prbLdhnzcy2bx:76Nk2pFF+pgup4AfLYPPawfW1pbnz8x
Static task
static1
Behavioral task
behavioral1
Sample
fe66ecbd6fd8ab53daf22a4f759ba8fe_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fe66ecbd6fd8ab53daf22a4f759ba8fe_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
lokibot
http://185.227.139.5/sxisodifntose.php/eOUCAsuJW0chL
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
fe66ecbd6fd8ab53daf22a4f759ba8fe_JaffaCakes118
-
Size
230KB
-
MD5
fe66ecbd6fd8ab53daf22a4f759ba8fe
-
SHA1
73e04864d4c4d7d402c082c4a6cd9934dd9907cc
-
SHA256
8fde220d40458eceb049d049f5391e8b2ff8f60e49d64d1272602e97d000a742
-
SHA512
6e3039f87dbb24a77bbc4599b33f01f6945e5a5e7f808e99e9fae0be48bc6fcee8cbc35425295dfee1fe60d742f5461975f45abd7369d58afd865b3e6abdce14
-
SSDEEP
3072:7KhRNLktPfWpUDQKsZo9vYCyQw4pa1AfLYPnEpDIEBtK9h1Wi8prbLdhnzcy2bx:76Nk2pFF+pgup4AfLYPPawfW1pbnz8x
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-