General
-
Target
54ff66195ece9c1508de2c1c109a194b_JaffaCakes118
-
Size
345KB
-
Sample
240518-qzvkhsec25
-
MD5
54ff66195ece9c1508de2c1c109a194b
-
SHA1
0deaf8baa74951daa4115c3abafbe220f091418f
-
SHA256
abfdb8ec52a42b83d076b3263305a947210cbd6466ed8c95996fb0c66fd12416
-
SHA512
6889479d060c802d2dbb1eb575d0a2c6c7b2666029daff531c31a553c6cf16fc76171be90ef39ca0165ecd55a1e63c8c19aeed533d221707e914452313421db2
-
SSDEEP
6144:Dfk6ZOyT3cxomesU25oVbET7L+eWMVZGD/0DMGHaENnK9GwrxL8dF2L/f8:7anU25oZS+0VZGhGHaP4wlR7f8
Static task
static1
Behavioral task
behavioral1
Sample
54ff66195ece9c1508de2c1c109a194b_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
54ff66195ece9c1508de2c1c109a194b_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
lokibot
http://188.215.229.110/ebuka/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
54ff66195ece9c1508de2c1c109a194b_JaffaCakes118
-
Size
345KB
-
MD5
54ff66195ece9c1508de2c1c109a194b
-
SHA1
0deaf8baa74951daa4115c3abafbe220f091418f
-
SHA256
abfdb8ec52a42b83d076b3263305a947210cbd6466ed8c95996fb0c66fd12416
-
SHA512
6889479d060c802d2dbb1eb575d0a2c6c7b2666029daff531c31a553c6cf16fc76171be90ef39ca0165ecd55a1e63c8c19aeed533d221707e914452313421db2
-
SSDEEP
6144:Dfk6ZOyT3cxomesU25oVbET7L+eWMVZGD/0DMGHaENnK9GwrxL8dF2L/f8:7anU25oZS+0VZGhGHaP4wlR7f8
Score10/10-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-