General
-
Target
8358a52140c6f7ad772a6e4f22782da2_JaffaCakes118
-
Size
392KB
-
Sample
240530-hn19xsaa4t
-
MD5
8358a52140c6f7ad772a6e4f22782da2
-
SHA1
114662d592e90220d820cef235dc3512c5d65276
-
SHA256
f08fe912fbd651afe2733f664baed63937edf176e8baedaf5692c15225ee17b9
-
SHA512
9310275a4fadcd2af79438b02cd67be59289a47df4cb9aff785bcf92cfedcf7bdfc64a724ad9f17aee58e329b310ce2094623c5d7ac2dfc4ba1ba8961b7a63d6
-
SSDEEP
12288:Sb8G+jH56Vn74qWgPvawYlMNLXt+fiKglAEan9:/jH5CWgPvDYuLXMfiKRE
Behavioral task
behavioral1
Sample
8358a52140c6f7ad772a6e4f22782da2_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8358a52140c6f7ad772a6e4f22782da2_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://parkrosegroup.info/lewy/sun/emmy/solar/gem/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
8358a52140c6f7ad772a6e4f22782da2_JaffaCakes118
-
Size
392KB
-
MD5
8358a52140c6f7ad772a6e4f22782da2
-
SHA1
114662d592e90220d820cef235dc3512c5d65276
-
SHA256
f08fe912fbd651afe2733f664baed63937edf176e8baedaf5692c15225ee17b9
-
SHA512
9310275a4fadcd2af79438b02cd67be59289a47df4cb9aff785bcf92cfedcf7bdfc64a724ad9f17aee58e329b310ce2094623c5d7ac2dfc4ba1ba8961b7a63d6
-
SSDEEP
12288:Sb8G+jH56Vn74qWgPvawYlMNLXt+fiKglAEan9:/jH5CWgPvDYuLXMfiKRE
Score10/10-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-