General
-
Target
957ca30d94029edddebefce67d130e87_JaffaCakes118
-
Size
580KB
-
Sample
240604-tqkwhace51
-
MD5
957ca30d94029edddebefce67d130e87
-
SHA1
048cefcd88d276aec8a77dad500ed6dbe7160b15
-
SHA256
6976207951b43cf1527144d93653a59e98c1b449d4ce358fc9950ad7908a5ce4
-
SHA512
0f4ee8b041ac3741d57badfeb0c112c2b36181249f01ecbfee2687d2923a33e71b7ab5b05a595f4796c1cf14de93051be8785af1059b0cf1ca36c37fb52c81d6
-
SSDEEP
12288:VdvK21V4zLlMPAiH756kp9/KZDzr5T8y8bq4HDbjl6i:ny21VwLkAQw8KZHr5TIBH1
Behavioral task
behavioral1
Sample
957ca30d94029edddebefce67d130e87_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
957ca30d94029edddebefce67d130e87_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
lokibot
http://parkrosegroup.info/lewy/sun/emmy/solar/gem/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
957ca30d94029edddebefce67d130e87_JaffaCakes118
-
Size
580KB
-
MD5
957ca30d94029edddebefce67d130e87
-
SHA1
048cefcd88d276aec8a77dad500ed6dbe7160b15
-
SHA256
6976207951b43cf1527144d93653a59e98c1b449d4ce358fc9950ad7908a5ce4
-
SHA512
0f4ee8b041ac3741d57badfeb0c112c2b36181249f01ecbfee2687d2923a33e71b7ab5b05a595f4796c1cf14de93051be8785af1059b0cf1ca36c37fb52c81d6
-
SSDEEP
12288:VdvK21V4zLlMPAiH756kp9/KZDzr5T8y8bq4HDbjl6i:ny21VwLkAQw8KZHr5TIBH1
Score10/10-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-