General
-
Target
7dd1d4c55c7e8ee669f31b6467535058_JaffaCakes118
-
Size
1.0MB
-
Sample
240528-v98mcadf61
-
MD5
7dd1d4c55c7e8ee669f31b6467535058
-
SHA1
5e661cb0b167b870afbe5021ca360df648093505
-
SHA256
3a20068e0f3ab8b9735f12b0a5475b01e9f5635acd80961248535531ff523bd4
-
SHA512
524a499ac8138f1e79410abd8de58c3357aa22f5709ba4585d08959fb0f0aa0ce0d24c486c10c430f9965ab34eddf54811bf50d6db31d726be5b19ec9c553506
-
SSDEEP
24576:YEd/ZEfUXF3yHcKKI7McIFQY2+v0Xe89vtbC:YEd/Z7dpQu0Xe8W
Static task
static1
Behavioral task
behavioral1
Sample
7dd1d4c55c7e8ee669f31b6467535058_JaffaCakes118.msi
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7dd1d4c55c7e8ee669f31b6467535058_JaffaCakes118.msi
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://ciston.nut.cc/bis-02/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
7dd1d4c55c7e8ee669f31b6467535058_JaffaCakes118
-
Size
1.0MB
-
MD5
7dd1d4c55c7e8ee669f31b6467535058
-
SHA1
5e661cb0b167b870afbe5021ca360df648093505
-
SHA256
3a20068e0f3ab8b9735f12b0a5475b01e9f5635acd80961248535531ff523bd4
-
SHA512
524a499ac8138f1e79410abd8de58c3357aa22f5709ba4585d08959fb0f0aa0ce0d24c486c10c430f9965ab34eddf54811bf50d6db31d726be5b19ec9c553506
-
SSDEEP
24576:YEd/ZEfUXF3yHcKKI7McIFQY2+v0Xe89vtbC:YEd/Z7dpQu0Xe8W
Score10/10-
Accesses Microsoft Outlook profiles
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-