General
-
Target
2423f7f4760abde3ea56dc0fe3c2ca64_JaffaCakes118
-
Size
336KB
-
Sample
240508-k2zdlafd78
-
MD5
2423f7f4760abde3ea56dc0fe3c2ca64
-
SHA1
c6355248b01b1257f61c0fba4d4f2e3302a1ebcf
-
SHA256
a4f95f33320c2520836f546c933cdb167943aa51e8ee7001f72e9adbaf442fe4
-
SHA512
6192745ba233057508c3f65134a04be1f4f2fc8b0f1f273bcda7de43126c14cb43711318210cddde0fd2f0af3e4414c798863fb75ccd8266e6541b7296160342
-
SSDEEP
3072:zEbCnCdktWk9hvJls5fPzBRvwbEn5OiWzWq6tC:zEupxhiHzB2o0iC6
Static task
static1
Behavioral task
behavioral1
Sample
2423f7f4760abde3ea56dc0fe3c2ca64_JaffaCakes118.msi
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2423f7f4760abde3ea56dc0fe3c2ca64_JaffaCakes118.msi
Resource
win10v2004-20240419-en
Malware Config
Extracted
lokibot
http://www.crownventureintl.com/wip-admin/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
2423f7f4760abde3ea56dc0fe3c2ca64_JaffaCakes118
-
Size
336KB
-
MD5
2423f7f4760abde3ea56dc0fe3c2ca64
-
SHA1
c6355248b01b1257f61c0fba4d4f2e3302a1ebcf
-
SHA256
a4f95f33320c2520836f546c933cdb167943aa51e8ee7001f72e9adbaf442fe4
-
SHA512
6192745ba233057508c3f65134a04be1f4f2fc8b0f1f273bcda7de43126c14cb43711318210cddde0fd2f0af3e4414c798863fb75ccd8266e6541b7296160342
-
SSDEEP
3072:zEbCnCdktWk9hvJls5fPzBRvwbEn5OiWzWq6tC:zEupxhiHzB2o0iC6
Score10/10-
Accesses Microsoft Outlook profiles
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-