General
-
Target
2bd0b03a64d483394ac137d2b2b75dda_JaffaCakes118
-
Size
803KB
-
Sample
240509-1e319sba54
-
MD5
2bd0b03a64d483394ac137d2b2b75dda
-
SHA1
cd3b8400d286ded0da4f859a001221aefa2d6608
-
SHA256
3bfd2f0990ca970ecd56727136b2c5ad53de3f4eb8e5a030675cef6997d5ff95
-
SHA512
a08a4d4734e681233053e8780833f8edf6b9fbc6c472ff06685470e333dde3f1ad5ef3fc33384d12d4ea7c1a0c253d5cbc6a1028bdedb99f5673cbcebd95f409
-
SSDEEP
12288:ab6mCM9sXHh9BoRPqsxOVKuS5r70xwgeqh043L97/hOZHPmkC/:TeSHhYRRxOVGcxJBdb1yS
Static task
static1
Behavioral task
behavioral1
Sample
2bd0b03a64d483394ac137d2b2b75dda_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2bd0b03a64d483394ac137d2b2b75dda_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://joovy.ga/chang/gate.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
2bd0b03a64d483394ac137d2b2b75dda_JaffaCakes118
-
Size
803KB
-
MD5
2bd0b03a64d483394ac137d2b2b75dda
-
SHA1
cd3b8400d286ded0da4f859a001221aefa2d6608
-
SHA256
3bfd2f0990ca970ecd56727136b2c5ad53de3f4eb8e5a030675cef6997d5ff95
-
SHA512
a08a4d4734e681233053e8780833f8edf6b9fbc6c472ff06685470e333dde3f1ad5ef3fc33384d12d4ea7c1a0c253d5cbc6a1028bdedb99f5673cbcebd95f409
-
SSDEEP
12288:ab6mCM9sXHh9BoRPqsxOVKuS5r70xwgeqh043L97/hOZHPmkC/:TeSHhYRRxOVGcxJBdb1yS
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-