General
-
Target
7faffe7091f5b6102dfb4cea734065df_JaffaCakes118
-
Size
1.2MB
-
Sample
240529-ggte3acd3y
-
MD5
7faffe7091f5b6102dfb4cea734065df
-
SHA1
0ad15267b011455a695082738fad6118ad5fc74e
-
SHA256
79c75eca7dac75274b5adf215b7d9c89af16b8e3a860926a704fa93cff9e8586
-
SHA512
e9d7737b467f21dac8a1997deb03960eb620e84e28ec26db316537a9d91d44d85d38598fc41342abb9d7bb4600c806e1bdbaf54f93d5190fad32d7b1a65f0e51
-
SSDEEP
24576:t0if5tEX7B1DIQaKzgNVXyGP4Ry14gjGTxlQqmPy3:t0HvUcg/rP4MtyZiy3
Static task
static1
Behavioral task
behavioral1
Sample
7faffe7091f5b6102dfb4cea734065df_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7faffe7091f5b6102dfb4cea734065df_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://pvcfloorco.com/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
7faffe7091f5b6102dfb4cea734065df_JaffaCakes118
-
Size
1.2MB
-
MD5
7faffe7091f5b6102dfb4cea734065df
-
SHA1
0ad15267b011455a695082738fad6118ad5fc74e
-
SHA256
79c75eca7dac75274b5adf215b7d9c89af16b8e3a860926a704fa93cff9e8586
-
SHA512
e9d7737b467f21dac8a1997deb03960eb620e84e28ec26db316537a9d91d44d85d38598fc41342abb9d7bb4600c806e1bdbaf54f93d5190fad32d7b1a65f0e51
-
SSDEEP
24576:t0if5tEX7B1DIQaKzgNVXyGP4Ry14gjGTxlQqmPy3:t0HvUcg/rP4MtyZiy3
Score10/10-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-