General
-
Target
2a69214ae7798e8f9310baa9bc7151de_JaffaCakes118
-
Size
708KB
-
Sample
240509-rwdy2ahd74
-
MD5
2a69214ae7798e8f9310baa9bc7151de
-
SHA1
aea38e9078196a1e86b6548020f64b8d28dde39c
-
SHA256
a9f2fb45fb2fff187fbd6ee2a93c5d9c8c7ef59b1174d0e3e77f4abb62a388a1
-
SHA512
0fcda1444979d1f526e664d8f03aac245c028cdda9a68870310ecfb0f9cecba42f5e814be9f348fee0e96fd2e5f15e033598af1e2fb4957dec187bfb432e7a7d
-
SSDEEP
12288:AAJQQbL8HkZqmbdK7u3PsEYdjmloClOxkK82pu:AAGEykZqm4APfYdeoUDKw
Static task
static1
Behavioral task
behavioral1
Sample
2a69214ae7798e8f9310baa9bc7151de_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2a69214ae7798e8f9310baa9bc7151de_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://uzoma.ru/db/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
2a69214ae7798e8f9310baa9bc7151de_JaffaCakes118
-
Size
708KB
-
MD5
2a69214ae7798e8f9310baa9bc7151de
-
SHA1
aea38e9078196a1e86b6548020f64b8d28dde39c
-
SHA256
a9f2fb45fb2fff187fbd6ee2a93c5d9c8c7ef59b1174d0e3e77f4abb62a388a1
-
SHA512
0fcda1444979d1f526e664d8f03aac245c028cdda9a68870310ecfb0f9cecba42f5e814be9f348fee0e96fd2e5f15e033598af1e2fb4957dec187bfb432e7a7d
-
SSDEEP
12288:AAJQQbL8HkZqmbdK7u3PsEYdjmloClOxkK82pu:AAGEykZqm4APfYdeoUDKw
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-