General
-
Target
a3d0110724e2a03abc79aa64b0b48e1d_JaffaCakes118
-
Size
691KB
-
Sample
240613-e1p6msxfqr
-
MD5
a3d0110724e2a03abc79aa64b0b48e1d
-
SHA1
a62e44d78c93d8a43e6ef9482f9da5ad852c7aa7
-
SHA256
38cc5994cb75abd23266c12a968c182da34342a66c6dc660b0068cb4b7aa806a
-
SHA512
14b18e967a2ea40d1b1978b90d482a33d886f756109a85e5bbf21982d043adec4d04db0f3fe95c1a8b78e911a22b327cf2a6a802df79c3f2c4f60957697e6d95
-
SSDEEP
12288:eQ5e6wJKHHFD0sxCdBkoVzzP3/138GmQNlLAUjDwE1sNEze6wbl:eAe6wJKnFD0coVzzPx8AL1vwE6NEze6o
Static task
static1
Behavioral task
behavioral1
Sample
a3d0110724e2a03abc79aa64b0b48e1d_JaffaCakes118.rtf
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a3d0110724e2a03abc79aa64b0b48e1d_JaffaCakes118.rtf
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://185.82.200.16/~zadmin/ema/cache.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
a3d0110724e2a03abc79aa64b0b48e1d_JaffaCakes118
-
Size
691KB
-
MD5
a3d0110724e2a03abc79aa64b0b48e1d
-
SHA1
a62e44d78c93d8a43e6ef9482f9da5ad852c7aa7
-
SHA256
38cc5994cb75abd23266c12a968c182da34342a66c6dc660b0068cb4b7aa806a
-
SHA512
14b18e967a2ea40d1b1978b90d482a33d886f756109a85e5bbf21982d043adec4d04db0f3fe95c1a8b78e911a22b327cf2a6a802df79c3f2c4f60957697e6d95
-
SSDEEP
12288:eQ5e6wJKHHFD0sxCdBkoVzzP3/138GmQNlLAUjDwE1sNEze6wbl:eAe6wJKnFD0coVzzPx8AL1vwE6NEze6o
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-