General
-
Target
ba1cc70555b22ced7297cb68609ff1f6_JaffaCakes118
-
Size
588KB
-
Sample
240617-3eve8ssgpj
-
MD5
ba1cc70555b22ced7297cb68609ff1f6
-
SHA1
33a487f992f3466b9a59eb7e0dfa900a4759aa1b
-
SHA256
a3a9e78c6544bf2f8cf533f81ff5262eac3612ed57b4517d3a044d775c6c4bd3
-
SHA512
15fb0b8e416a9d7ab899e00b50e3b72571abeb430969615880a0331e07c3dc17ba86851956c04e55a7b8ae52ea8c61f7c31f93adebef1e3165a466d804644882
-
SSDEEP
12288:gFTPm1RJGE5wJGE50AD+CDLyCIUTtuPEEqQ:gFK7JNyJN5L7Ftc
Static task
static1
Behavioral task
behavioral1
Sample
ba1cc70555b22ced7297cb68609ff1f6_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba1cc70555b22ced7297cb68609ff1f6_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://pesinatrading.net/sql/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
ba1cc70555b22ced7297cb68609ff1f6_JaffaCakes118
-
Size
588KB
-
MD5
ba1cc70555b22ced7297cb68609ff1f6
-
SHA1
33a487f992f3466b9a59eb7e0dfa900a4759aa1b
-
SHA256
a3a9e78c6544bf2f8cf533f81ff5262eac3612ed57b4517d3a044d775c6c4bd3
-
SHA512
15fb0b8e416a9d7ab899e00b50e3b72571abeb430969615880a0331e07c3dc17ba86851956c04e55a7b8ae52ea8c61f7c31f93adebef1e3165a466d804644882
-
SSDEEP
12288:gFTPm1RJGE5wJGE50AD+CDLyCIUTtuPEEqQ:gFK7JNyJN5L7Ftc
Score10/10-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-