General
-
Target
4ff87ad46311de76229dc57a1c3b72ee_JaffaCakes118
-
Size
1.1MB
-
Sample
240517-rp9gcsbe3x
-
MD5
4ff87ad46311de76229dc57a1c3b72ee
-
SHA1
51cb03f06b8f5485842a192f137f4b746d87f7e4
-
SHA256
f614e6f10dcbfd97cf6d33ce9c480a96e38b8bea4245067e7e2ef2d0b0cfcc8d
-
SHA512
7631ea53673ee9d0475905152e1fa4ec29a36df234e5943f21f55e752098715f3ddfac6c8fb72640df9e34ba7c4699a542a60db59db548f324e67203cac0bb8c
-
SSDEEP
24576:O4qMHwL06i5ZTx3hucuuCN4HwgqOPqKy7vJydBWNe/ISImkz:NZxucudHgQKKvGBWWk
Static task
static1
Behavioral task
behavioral1
Sample
4ff87ad46311de76229dc57a1c3b72ee_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4ff87ad46311de76229dc57a1c3b72ee_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://omantell.net.in/components/com_finder/jizzy/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
4ff87ad46311de76229dc57a1c3b72ee_JaffaCakes118
-
Size
1.1MB
-
MD5
4ff87ad46311de76229dc57a1c3b72ee
-
SHA1
51cb03f06b8f5485842a192f137f4b746d87f7e4
-
SHA256
f614e6f10dcbfd97cf6d33ce9c480a96e38b8bea4245067e7e2ef2d0b0cfcc8d
-
SHA512
7631ea53673ee9d0475905152e1fa4ec29a36df234e5943f21f55e752098715f3ddfac6c8fb72640df9e34ba7c4699a542a60db59db548f324e67203cac0bb8c
-
SSDEEP
24576:O4qMHwL06i5ZTx3hucuuCN4HwgqOPqKy7vJydBWNe/ISImkz:NZxucudHgQKKvGBWWk
Score10/10-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-