General
-
Target
9699e2d579ff46e6bf8d1e594deb82c3_JaffaCakes118
-
Size
237KB
-
Sample
240604-3ct2paeh4s
-
MD5
9699e2d579ff46e6bf8d1e594deb82c3
-
SHA1
eede5acdec4bd384e31f860b85e786ebc964a847
-
SHA256
0c588715b2808ec347da3071ee4430730acc2d63af63112dec569d9f4e8693a8
-
SHA512
9f0ff84ea0a56445b90cddcc003291f107ad955ec40ef7362a1be31a37ed6743e9d5f50f3d2adf0cfc176575c7b5b8e6e3d25ca38303a1ab5472b6dd48352517
-
SSDEEP
6144:IF93EUEUtQil7dA00TxQvjIFmYmZ8YSDwpWx7taiM1Xu3:IFBEUE8qFyk99op27tC
Static task
static1
Behavioral task
behavioral1
Sample
9699e2d579ff46e6bf8d1e594deb82c3_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9699e2d579ff46e6bf8d1e594deb82c3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://kaokao-twn.com/exploitedreal/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
9699e2d579ff46e6bf8d1e594deb82c3_JaffaCakes118
-
Size
237KB
-
MD5
9699e2d579ff46e6bf8d1e594deb82c3
-
SHA1
eede5acdec4bd384e31f860b85e786ebc964a847
-
SHA256
0c588715b2808ec347da3071ee4430730acc2d63af63112dec569d9f4e8693a8
-
SHA512
9f0ff84ea0a56445b90cddcc003291f107ad955ec40ef7362a1be31a37ed6743e9d5f50f3d2adf0cfc176575c7b5b8e6e3d25ca38303a1ab5472b6dd48352517
-
SSDEEP
6144:IF93EUEUtQil7dA00TxQvjIFmYmZ8YSDwpWx7taiM1Xu3:IFBEUE8qFyk99op27tC
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-