General
-
Target
5116d8721b3d13837a7620c9b6958850_JaffaCakes118
-
Size
1.1MB
-
Sample
240517-x3v4saeh44
-
MD5
5116d8721b3d13837a7620c9b6958850
-
SHA1
d402b7af22658ced3156596f7b4bc2b7dec3e514
-
SHA256
09746ba6237daef52ac3d96ed2b9bcec5e4b992a8950daa283a50abb3403ed48
-
SHA512
37cf04bbf80373a46b17ac47f303f0a5dbaa69e5797a5438af8d8e21f0b4094e4ea8c2ceffa660da5af8599d9b38f121d72687b49aa9378b3316d1a6de6e3a3c
-
SSDEEP
24576:oM2i94KHSyvzoG44iahLWvUWjqKTp6RzPOZa+qYmCvwGea:oMbHdWF4R+vH
Static task
static1
Behavioral task
behavioral1
Sample
5116d8721b3d13837a7620c9b6958850_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5116d8721b3d13837a7620c9b6958850_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
lokibot
http://ledrazen.com/lewy/sun/zeya/solar/gem/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
5116d8721b3d13837a7620c9b6958850_JaffaCakes118
-
Size
1.1MB
-
MD5
5116d8721b3d13837a7620c9b6958850
-
SHA1
d402b7af22658ced3156596f7b4bc2b7dec3e514
-
SHA256
09746ba6237daef52ac3d96ed2b9bcec5e4b992a8950daa283a50abb3403ed48
-
SHA512
37cf04bbf80373a46b17ac47f303f0a5dbaa69e5797a5438af8d8e21f0b4094e4ea8c2ceffa660da5af8599d9b38f121d72687b49aa9378b3316d1a6de6e3a3c
-
SSDEEP
24576:oM2i94KHSyvzoG44iahLWvUWjqKTp6RzPOZa+qYmCvwGea:oMbHdWF4R+vH
Score10/10-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-