General
-
Target
04da28e1e2f5f59e53be79921720c92f_JaffaCakes118
-
Size
388KB
-
Sample
240623-ck3exszapj
-
MD5
04da28e1e2f5f59e53be79921720c92f
-
SHA1
864a8cd519fefb536c3dffae37eed196a20b23f4
-
SHA256
8363765ca1ed896fa3f428812509b36d7f77f97a1746b34e8f9f64e18589d0b0
-
SHA512
4c1f89b1cc56315964afa3690ee6150e1f8b0939f367de643eec499f5f2aa23f0c6a6e84f29fc12af6d45a1228cbff2fbb0d62a8157109e7d06c7e860ea89d7f
-
SSDEEP
12288:vFda+Fda7CbYQjoiuN3JI8xd5rtSGFAZnreQQAf:oCbYQjoBN3JI8zlStr
Static task
static1
Behavioral task
behavioral1
Sample
04da28e1e2f5f59e53be79921720c92f_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
04da28e1e2f5f59e53be79921720c92f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://51.195.53.221/p.php/zJx6s66z1V9LA
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
04da28e1e2f5f59e53be79921720c92f_JaffaCakes118
-
Size
388KB
-
MD5
04da28e1e2f5f59e53be79921720c92f
-
SHA1
864a8cd519fefb536c3dffae37eed196a20b23f4
-
SHA256
8363765ca1ed896fa3f428812509b36d7f77f97a1746b34e8f9f64e18589d0b0
-
SHA512
4c1f89b1cc56315964afa3690ee6150e1f8b0939f367de643eec499f5f2aa23f0c6a6e84f29fc12af6d45a1228cbff2fbb0d62a8157109e7d06c7e860ea89d7f
-
SSDEEP
12288:vFda+Fda7CbYQjoiuN3JI8xd5rtSGFAZnreQQAf:oCbYQjoBN3JI8zlStr
Score10/10-
Beds Protector Packer
Detects Beds Protector packer used to load .NET malware.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-