General
-
Target
4ebddc153fb991334e48861abb3640dd_JaffaCakes118
-
Size
521KB
-
Sample
240517-gxtqrsch61
-
MD5
4ebddc153fb991334e48861abb3640dd
-
SHA1
2bccc6760970fd7f38534ad04504412ef20ede9e
-
SHA256
0e63ee22a2a9b5b15e0227772a72bbbb48bc5987833615ff42a6e6447221ea80
-
SHA512
432d62d3601f34902119b6373810429900947bdab069412a0c8d02e9dd9b372adf290371197328d0df66a1d88f535ddd300696674c3404227d63cc0b5387043c
-
SSDEEP
12288:SCVIDRqnBI3euYAdlRl0QwKpZNBUy6kvsKq:RVIAy3ed9K1yy5q
Static task
static1
Behavioral task
behavioral1
Sample
4ebddc153fb991334e48861abb3640dd_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4ebddc153fb991334e48861abb3640dd_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
lokibot
http://nwatti.tk/gata/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
4ebddc153fb991334e48861abb3640dd_JaffaCakes118
-
Size
521KB
-
MD5
4ebddc153fb991334e48861abb3640dd
-
SHA1
2bccc6760970fd7f38534ad04504412ef20ede9e
-
SHA256
0e63ee22a2a9b5b15e0227772a72bbbb48bc5987833615ff42a6e6447221ea80
-
SHA512
432d62d3601f34902119b6373810429900947bdab069412a0c8d02e9dd9b372adf290371197328d0df66a1d88f535ddd300696674c3404227d63cc0b5387043c
-
SSDEEP
12288:SCVIDRqnBI3euYAdlRl0QwKpZNBUy6kvsKq:RVIAy3ed9K1yy5q
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-