General
-
Target
0de45b6b06da3062434319df3beb8d3a_JaffaCakes118
-
Size
365KB
-
Sample
240625-nj5dnswhng
-
MD5
0de45b6b06da3062434319df3beb8d3a
-
SHA1
fd4782a1eaa677888e7f652dc79d777d312901b0
-
SHA256
485b6f63100f76e0e4eb9c46f8a98823f47ca8a19d38fd7e95f7056413807f91
-
SHA512
f17e4e6d956a8a6a26094ae1fb66dd98745bccd51aa8cebcdbee705f62c0542813d492e20b3fcf2d1c2312c4811f47369cf984f41268dd4fed3fc0ed95f427c6
-
SSDEEP
6144:/uq2uE3WpQMV/0dfoXvXAa5EQJJf6AQQXt3qy+00bRxU3RUCjo6:/ZFQMGqfwkDhgH0StB6
Static task
static1
Behavioral task
behavioral1
Sample
0de45b6b06da3062434319df3beb8d3a_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
lokibot
http://jenedomain.com/f2/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
0de45b6b06da3062434319df3beb8d3a_JaffaCakes118
-
Size
365KB
-
MD5
0de45b6b06da3062434319df3beb8d3a
-
SHA1
fd4782a1eaa677888e7f652dc79d777d312901b0
-
SHA256
485b6f63100f76e0e4eb9c46f8a98823f47ca8a19d38fd7e95f7056413807f91
-
SHA512
f17e4e6d956a8a6a26094ae1fb66dd98745bccd51aa8cebcdbee705f62c0542813d492e20b3fcf2d1c2312c4811f47369cf984f41268dd4fed3fc0ed95f427c6
-
SSDEEP
6144:/uq2uE3WpQMV/0dfoXvXAa5EQJJf6AQQXt3qy+00bRxU3RUCjo6:/ZFQMGqfwkDhgH0StB6
-
Beds Protector Packer
Detects Beds Protector packer used to load .NET malware.
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-