Resubmissions
01-06-2024 17:40
240601-v83dyahh8x 10General
-
Target
8b3aca2dfeaeb8f1d1e577de9ef211b7_JaffaCakes118
-
Size
374KB
-
Sample
240601-v83dyahh8x
-
MD5
8b3aca2dfeaeb8f1d1e577de9ef211b7
-
SHA1
3d9d027e763f5d70849a552b8e18273a7586dd2c
-
SHA256
874b051f2252d5a1dd48429bf57c53f19ad1d8b6ec00c68eda437c9676f2efce
-
SHA512
66b02770756d1b3f288bd37ff9c1fc6fc9efcfa707d9b4dd1a0a20520a0d7c133287f99081df64d7c9bab00fd0933a4f3aa48fdc41fdcf72277a44c6b1eb4dbb
-
SSDEEP
6144:5hPerPM/xXgPfF/x8FRc5qCCf75XxY2PBt60p1D7VCL2FB/HCAIBisnLk5YzqWdd:5hPerIVgPd/x8FReqCQ5xY6V7swCP8sP
Behavioral task
behavioral1
Sample
8b3aca2dfeaeb8f1d1e577de9ef211b7_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8b3aca2dfeaeb8f1d1e577de9ef211b7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://jadorplov.com/ret/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
8b3aca2dfeaeb8f1d1e577de9ef211b7_JaffaCakes118
-
Size
374KB
-
MD5
8b3aca2dfeaeb8f1d1e577de9ef211b7
-
SHA1
3d9d027e763f5d70849a552b8e18273a7586dd2c
-
SHA256
874b051f2252d5a1dd48429bf57c53f19ad1d8b6ec00c68eda437c9676f2efce
-
SHA512
66b02770756d1b3f288bd37ff9c1fc6fc9efcfa707d9b4dd1a0a20520a0d7c133287f99081df64d7c9bab00fd0933a4f3aa48fdc41fdcf72277a44c6b1eb4dbb
-
SSDEEP
6144:5hPerPM/xXgPfF/x8FRc5qCCf75XxY2PBt60p1D7VCL2FB/HCAIBisnLk5YzqWdd:5hPerIVgPd/x8FReqCQ5xY6V7swCP8sP
Score10/10-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-