General
-
Target
06854e61899fff2b198c91a5a25cff6d_JaffaCakes118
-
Size
490KB
-
Sample
240623-rs66eaxgpk
-
MD5
06854e61899fff2b198c91a5a25cff6d
-
SHA1
6b74e8be276b9f16b4732a3e4a2bd69a39e9bf9b
-
SHA256
e21a9d3df315dd8e55f1178611a622bb43c5be81eafed44c7c7ce1035f0f4691
-
SHA512
ec87153a038e858641d88d03a8b9142c7838cfcd02795c93299bd52c40a975cb34dfa7792d10615aea8fe6fa3763c395fe84812037d15426bc341c6149af070b
-
SSDEEP
6144:ih6o1R1khh63aQbSFvU9+kRIluFRfwVnvUjWkY1hdQUdwzMTIv9QZgmT:C1R1kDVvUwGOnnvAEQsqbV
Static task
static1
Behavioral task
behavioral1
Sample
06854e61899fff2b198c91a5a25cff6d_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
06854e61899fff2b198c91a5a25cff6d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
lokibot
https://lokipanelhostingpanel.gq/panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
06854e61899fff2b198c91a5a25cff6d_JaffaCakes118
-
Size
490KB
-
MD5
06854e61899fff2b198c91a5a25cff6d
-
SHA1
6b74e8be276b9f16b4732a3e4a2bd69a39e9bf9b
-
SHA256
e21a9d3df315dd8e55f1178611a622bb43c5be81eafed44c7c7ce1035f0f4691
-
SHA512
ec87153a038e858641d88d03a8b9142c7838cfcd02795c93299bd52c40a975cb34dfa7792d10615aea8fe6fa3763c395fe84812037d15426bc341c6149af070b
-
SSDEEP
6144:ih6o1R1khh63aQbSFvU9+kRIluFRfwVnvUjWkY1hdQUdwzMTIv9QZgmT:C1R1kDVvUwGOnnvAEQsqbV
Score10/10-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-