General
-
Target
985b234a10b79ede6690e09e92973bad_JaffaCakes118
-
Size
410KB
-
Sample
240605-rfewdshc9w
-
MD5
985b234a10b79ede6690e09e92973bad
-
SHA1
ef8784716282e30366715b6232f5372ab5ccf1a0
-
SHA256
972becbe534eb9c123a13abb463184baaa5068512bdf342d5dfd84b66a23a5c7
-
SHA512
4acad23173dd92eb5cba7e44f33258747f88177d21ae3388ea5339acf98ec70291ccb78ee965a8add1b3eaa63c0536c80fdbb7d3b78f2ecc4575129a5b7084e5
-
SSDEEP
6144:X8FfVTg9z1P9qNV8DPSawX0t6HS0vkIvHMeB7FlqrlN/vC3HlAOiu0w0YkfmikC:XIwR9YVsNiXfvttYpN/vC09
Behavioral task
behavioral1
Sample
985b234a10b79ede6690e09e92973bad_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
985b234a10b79ede6690e09e92973bad_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
lokibot
http://alhadin.nl/Loki/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
985b234a10b79ede6690e09e92973bad_JaffaCakes118
-
Size
410KB
-
MD5
985b234a10b79ede6690e09e92973bad
-
SHA1
ef8784716282e30366715b6232f5372ab5ccf1a0
-
SHA256
972becbe534eb9c123a13abb463184baaa5068512bdf342d5dfd84b66a23a5c7
-
SHA512
4acad23173dd92eb5cba7e44f33258747f88177d21ae3388ea5339acf98ec70291ccb78ee965a8add1b3eaa63c0536c80fdbb7d3b78f2ecc4575129a5b7084e5
-
SSDEEP
6144:X8FfVTg9z1P9qNV8DPSawX0t6HS0vkIvHMeB7FlqrlN/vC3HlAOiu0w0YkfmikC:XIwR9YVsNiXfvttYpN/vC09
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-