General
-
Target
660066887aff5fac3cd7b6396759a905_JaffaCakes118
-
Size
1009KB
-
Sample
240522-e4s2pscc6v
-
MD5
660066887aff5fac3cd7b6396759a905
-
SHA1
5e0027e7d708a2af94c79d945ca94339ab0b2dce
-
SHA256
5c574701ad94c149b7496f6e738caae832bd64561c0400ba69355f9bedb80825
-
SHA512
b0c0405acf817f3020f86f071a21e8c0cbf1e086ffe7390e424b93e0cb3506ffa4d2d8c932de28c1ee2b4d34bd55ee84bf55e949ac247e3f26aa4182db0d1bed
-
SSDEEP
24576:hNamxn5WxOMrOj2VoNm8ODDXD7WjqKTp6RzPOZa+qYmCB7QMGe4:HzvWxHr13z7WF4R+iJ
Static task
static1
Behavioral task
behavioral1
Sample
660066887aff5fac3cd7b6396759a905_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
660066887aff5fac3cd7b6396759a905_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://joanread.ru/timo/fred.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
660066887aff5fac3cd7b6396759a905_JaffaCakes118
-
Size
1009KB
-
MD5
660066887aff5fac3cd7b6396759a905
-
SHA1
5e0027e7d708a2af94c79d945ca94339ab0b2dce
-
SHA256
5c574701ad94c149b7496f6e738caae832bd64561c0400ba69355f9bedb80825
-
SHA512
b0c0405acf817f3020f86f071a21e8c0cbf1e086ffe7390e424b93e0cb3506ffa4d2d8c932de28c1ee2b4d34bd55ee84bf55e949ac247e3f26aa4182db0d1bed
-
SSDEEP
24576:hNamxn5WxOMrOj2VoNm8ODDXD7WjqKTp6RzPOZa+qYmCB7QMGe4:HzvWxHr13z7WF4R+iJ
Score10/10-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-