General
-
Target
39785a54266c4913b1c742438a591dd0_JaffaCakes118
-
Size
276KB
-
Sample
240512-lq2j9aab5w
-
MD5
39785a54266c4913b1c742438a591dd0
-
SHA1
f9420bc46643a0257bc64b05bb584db01a0d2eb2
-
SHA256
f2a8196758ba541344e90a320f4c01d93e83aae305d6dfde5d96f6444cf30a5f
-
SHA512
4f4b75134ad2a2d97447dda49440b81ebe72870901066fa5319f7144102b781efd2e339d6ef516a45a5761f7e51a9f13b0befd8a31cf07c6b15939e2d689e7cb
-
SSDEEP
6144:3E0yyMaPnpTFg3c4LR5BodhWWYR6gn6CyFlo5s+CG9FsEpkKBFaPwdg:3E8pvpTFOXN5wWpUrmC4DR3ao
Static task
static1
Behavioral task
behavioral1
Sample
39785a54266c4913b1c742438a591dd0_JaffaCakes118.msi
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
39785a54266c4913b1c742438a591dd0_JaffaCakes118.msi
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://adrack.us/wp-admin/css/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
39785a54266c4913b1c742438a591dd0_JaffaCakes118
-
Size
276KB
-
MD5
39785a54266c4913b1c742438a591dd0
-
SHA1
f9420bc46643a0257bc64b05bb584db01a0d2eb2
-
SHA256
f2a8196758ba541344e90a320f4c01d93e83aae305d6dfde5d96f6444cf30a5f
-
SHA512
4f4b75134ad2a2d97447dda49440b81ebe72870901066fa5319f7144102b781efd2e339d6ef516a45a5761f7e51a9f13b0befd8a31cf07c6b15939e2d689e7cb
-
SSDEEP
6144:3E0yyMaPnpTFg3c4LR5BodhWWYR6gn6CyFlo5s+CG9FsEpkKBFaPwdg:3E8pvpTFOXN5wWpUrmC4DR3ao
Score10/10-
Accesses Microsoft Outlook profiles
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-