General
-
Target
8f030eebe597a7e0b1fd57b59c10bf58_JaffaCakes118
-
Size
1.1MB
-
Sample
240602-w6xlcabh37
-
MD5
8f030eebe597a7e0b1fd57b59c10bf58
-
SHA1
97039cb437fa33ccea444b61b6464d876556359d
-
SHA256
0da0aecf4d4a97942a5fb6c591a8947243a76aee5e2ca35a30ec3aa77c6adf7b
-
SHA512
3bd66a2bee6a9070d0e4cf4e114164cd7be73833a0a88d03d4dae355c7b637266c093e5659e2865ae67717719f0ab926e99ab2c5f1d70e207e98c52e92501cc2
-
SSDEEP
24576:QAHnh+eWsN3skA4RV1Hom2KXMmHaV2z1eurdEmzWK85:Hh+ZkldoPK8YaVHWyms
Static task
static1
Behavioral task
behavioral1
Sample
8f030eebe597a7e0b1fd57b59c10bf58_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8f030eebe597a7e0b1fd57b59c10bf58_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://umpackuae.com/aza/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
8f030eebe597a7e0b1fd57b59c10bf58_JaffaCakes118
-
Size
1.1MB
-
MD5
8f030eebe597a7e0b1fd57b59c10bf58
-
SHA1
97039cb437fa33ccea444b61b6464d876556359d
-
SHA256
0da0aecf4d4a97942a5fb6c591a8947243a76aee5e2ca35a30ec3aa77c6adf7b
-
SHA512
3bd66a2bee6a9070d0e4cf4e114164cd7be73833a0a88d03d4dae355c7b637266c093e5659e2865ae67717719f0ab926e99ab2c5f1d70e207e98c52e92501cc2
-
SSDEEP
24576:QAHnh+eWsN3skA4RV1Hom2KXMmHaV2z1eurdEmzWK85:Hh+ZkldoPK8YaVHWyms
Score10/10-
Accesses Microsoft Outlook profiles
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-