General
-
Target
566c2c6c5c45306f03831e2c656267ec_JaffaCakes118
-
Size
1.5MB
-
Sample
240518-yacmeacc24
-
MD5
566c2c6c5c45306f03831e2c656267ec
-
SHA1
689b81989a8bffcc5674f9389fd233348be46f08
-
SHA256
329c3b1c04a4b64aa1f20adf2d8df0d409a0d8e816acf3f29e497d3b1946808b
-
SHA512
7e2e028c86fbd6287a1db1a63e6516047fc69d7fad65f7abe41093bc27fe674e93aad9590ba72a28b457d1d9c0393954af54d5e2264f6a6bf0b091c49c496c95
-
SSDEEP
24576:pd6qlMEjK59o/Uv9IXvaVojYaT5bDbZUgtUfLznefTHLtpxQrUjDuZ4O:y
Static task
static1
Behavioral task
behavioral1
Sample
566c2c6c5c45306f03831e2c656267ec_JaffaCakes118.rtf
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
566c2c6c5c45306f03831e2c656267ec_JaffaCakes118.rtf
Resource
win10v2004-20240426-en
Malware Config
Extracted
lokibot
http://gavrelssimonskype.su/wp/web-obtain/css/log/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
566c2c6c5c45306f03831e2c656267ec_JaffaCakes118
-
Size
1.5MB
-
MD5
566c2c6c5c45306f03831e2c656267ec
-
SHA1
689b81989a8bffcc5674f9389fd233348be46f08
-
SHA256
329c3b1c04a4b64aa1f20adf2d8df0d409a0d8e816acf3f29e497d3b1946808b
-
SHA512
7e2e028c86fbd6287a1db1a63e6516047fc69d7fad65f7abe41093bc27fe674e93aad9590ba72a28b457d1d9c0393954af54d5e2264f6a6bf0b091c49c496c95
-
SSDEEP
24576:pd6qlMEjK59o/Uv9IXvaVojYaT5bDbZUgtUfLznefTHLtpxQrUjDuZ4O:y
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-