General
-
Target
917907d1dea3d46c1685b6095874d13d_JaffaCakes118
-
Size
793KB
-
Sample
240603-mpq8kacg98
-
MD5
917907d1dea3d46c1685b6095874d13d
-
SHA1
42f131d3a8e26906154e41eb3fc3a137571bafb6
-
SHA256
64c1c7ac5f0615e99250e0bf9e633110d95d1b0bc3c9bf23a36ea93fd7f378f6
-
SHA512
a98ff156969b5dfebd1dffd54d19702ce15762855e3305cacb4c0bef2b8def76146a8a3462ada63403dd5317d85c941461934c20eb63bffdb02537499be3fe81
-
SSDEEP
12288:+hVxw3QAnPVtK20o2Lw3QsHsCwh2q+OpoTl/wWuXIF61v:cALnPVE207eC2pOtXmqv
Static task
static1
Behavioral task
behavioral1
Sample
917907d1dea3d46c1685b6095874d13d_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
917907d1dea3d46c1685b6095874d13d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://151.80.3.78/mte/4/cat.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
917907d1dea3d46c1685b6095874d13d_JaffaCakes118
-
Size
793KB
-
MD5
917907d1dea3d46c1685b6095874d13d
-
SHA1
42f131d3a8e26906154e41eb3fc3a137571bafb6
-
SHA256
64c1c7ac5f0615e99250e0bf9e633110d95d1b0bc3c9bf23a36ea93fd7f378f6
-
SHA512
a98ff156969b5dfebd1dffd54d19702ce15762855e3305cacb4c0bef2b8def76146a8a3462ada63403dd5317d85c941461934c20eb63bffdb02537499be3fe81
-
SSDEEP
12288:+hVxw3QAnPVtK20o2Lw3QsHsCwh2q+OpoTl/wWuXIF61v:cALnPVE207eC2pOtXmqv
Score10/10-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-