General
-
Target
767fad8469801daac50f5365709e0149_JaffaCakes118
-
Size
532KB
-
Sample
240526-xngylsgd6x
-
MD5
767fad8469801daac50f5365709e0149
-
SHA1
61644800d1d9e46a2cd0e628bed9fd68f62428e0
-
SHA256
744efffd117bb492d7707a2d16ae3e16dc65ea52b475c4b1f8d993f66f89f08c
-
SHA512
554bd5dcd661e60a07a60deb116032eaa1b041ca1ba00b27bb9136b986cac8e7c80d456f75b789458f98bccb671a521b636901e192ca561bfaefa4eccf24ff18
-
SSDEEP
6144:lEBrHvFzum8tLMmbRLHMTg2N6lpiKYeWPo+X84xLy57:lEjItLMMJMqlpHp4
Static task
static1
Behavioral task
behavioral1
Sample
767fad8469801daac50f5365709e0149_JaffaCakes118.msi
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
767fad8469801daac50f5365709e0149_JaffaCakes118.msi
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://deloilte.com/wp-content/uploads/2018/09/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
767fad8469801daac50f5365709e0149_JaffaCakes118
-
Size
532KB
-
MD5
767fad8469801daac50f5365709e0149
-
SHA1
61644800d1d9e46a2cd0e628bed9fd68f62428e0
-
SHA256
744efffd117bb492d7707a2d16ae3e16dc65ea52b475c4b1f8d993f66f89f08c
-
SHA512
554bd5dcd661e60a07a60deb116032eaa1b041ca1ba00b27bb9136b986cac8e7c80d456f75b789458f98bccb671a521b636901e192ca561bfaefa4eccf24ff18
-
SSDEEP
6144:lEBrHvFzum8tLMmbRLHMTg2N6lpiKYeWPo+X84xLy57:lEjItLMMJMqlpHp4
Score10/10-
Accesses Microsoft Outlook profiles
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-