General
-
Target
7526736bf28f79f6ba947cc03c6fcd50_JaffaCakes118
-
Size
411KB
-
Sample
240526-l9vwtaeg5y
-
MD5
7526736bf28f79f6ba947cc03c6fcd50
-
SHA1
7dd2bd7e2008e38358fa2a0e9f398faf41ce97d1
-
SHA256
df72fc36385e126949ac79802518d9aa8c2fc72c80fd70e6ed50f4484e1b8b53
-
SHA512
e4a6d540962871b765de219552b3bdf3c9a8c5c2d775fe50d032971fa4cb8988ee4ce418570eb4b7188ad2643862e6d8d745f98d2d677dab6576114bc5e0713f
-
SSDEEP
6144:6teU5EzqJeWFgwvLkIeRykKnH3wgHz8mZX2p0apdWUUGkPquTuxkOcyr:AexOJeWuIe4L3w6rl2H3cqYux
Behavioral task
behavioral1
Sample
7526736bf28f79f6ba947cc03c6fcd50_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7526736bf28f79f6ba947cc03c6fcd50_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://abscete.info/hero/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
7526736bf28f79f6ba947cc03c6fcd50_JaffaCakes118
-
Size
411KB
-
MD5
7526736bf28f79f6ba947cc03c6fcd50
-
SHA1
7dd2bd7e2008e38358fa2a0e9f398faf41ce97d1
-
SHA256
df72fc36385e126949ac79802518d9aa8c2fc72c80fd70e6ed50f4484e1b8b53
-
SHA512
e4a6d540962871b765de219552b3bdf3c9a8c5c2d775fe50d032971fa4cb8988ee4ce418570eb4b7188ad2643862e6d8d745f98d2d677dab6576114bc5e0713f
-
SSDEEP
6144:6teU5EzqJeWFgwvLkIeRykKnH3wgHz8mZX2p0apdWUUGkPquTuxkOcyr:AexOJeWuIe4L3w6rl2H3cqYux
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-