General
-
Target
43e7a60f724785224a0a6d9eec3ebd06_JaffaCakes118
-
Size
795KB
-
Sample
240515-bhklnaaa54
-
MD5
43e7a60f724785224a0a6d9eec3ebd06
-
SHA1
db2842a24c4a10065f808cec5a84a3faa6d05686
-
SHA256
9ab58c08a559a5b8d3a4a4b180e72bd08eb881246dd4d151bfd6ce0ae42fb533
-
SHA512
7409dcb648e24e13b202ce1ce15290de44708ed42d89fc51539a037c2301357fcb3aab92fb932c795ba860fdee2a593f39f2b4349832953c35195d13412936fb
-
SSDEEP
12288:8YV6MorX7qzuC3QHO9FQVHPF51jgcdomfb9fFAy/C49elVD6Ra4UtGI/3NFtLM:bBXu9HGaVH9NAKXe7k4th2
Behavioral task
behavioral1
Sample
43e7a60f724785224a0a6d9eec3ebd06_JaffaCakes118.exe
Resource
win7-20240508-en
Malware Config
Extracted
lokibot
http://176.223.131.165/iv-u/@6/cat.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
43e7a60f724785224a0a6d9eec3ebd06_JaffaCakes118
-
Size
795KB
-
MD5
43e7a60f724785224a0a6d9eec3ebd06
-
SHA1
db2842a24c4a10065f808cec5a84a3faa6d05686
-
SHA256
9ab58c08a559a5b8d3a4a4b180e72bd08eb881246dd4d151bfd6ce0ae42fb533
-
SHA512
7409dcb648e24e13b202ce1ce15290de44708ed42d89fc51539a037c2301357fcb3aab92fb932c795ba860fdee2a593f39f2b4349832953c35195d13412936fb
-
SSDEEP
12288:8YV6MorX7qzuC3QHO9FQVHPF51jgcdomfb9fFAy/C49elVD6Ra4UtGI/3NFtLM:bBXu9HGaVH9NAKXe7k4th2
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-