General
-
Target
2177e23fdb0edf07b9390bbc12979379_JaffaCakes118
-
Size
328KB
-
Sample
240703-hs6p7swcqm
-
MD5
2177e23fdb0edf07b9390bbc12979379
-
SHA1
7e7d208af5ecd7e1f66f6cc7e410703af666bdf4
-
SHA256
b104c6fe931b690475af8136070db62905cc25d9e7713ca5d6d38651e7e179b7
-
SHA512
e98fe87f954827b7ebc427f4380927cd4664724a661e97f614601c44d6a999442896218664fee3d8ef5c6119ffc82828699cb13468db8722d7ee2e47e6157dfa
-
SSDEEP
6144:psE3WpQMV/0dfoXvXAa5EQJJf2dKhbrct9lx7lm5b7TiOxU3RUCjj:psFQMGqfwkDaKtovMltq
Static task
static1
Behavioral task
behavioral1
Sample
2177e23fdb0edf07b9390bbc12979379_JaffaCakes118.exe
Resource
win7-20240611-en
Malware Config
Extracted
lokibot
http://cnyedo.cf/kill/five//fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
2177e23fdb0edf07b9390bbc12979379_JaffaCakes118
-
Size
328KB
-
MD5
2177e23fdb0edf07b9390bbc12979379
-
SHA1
7e7d208af5ecd7e1f66f6cc7e410703af666bdf4
-
SHA256
b104c6fe931b690475af8136070db62905cc25d9e7713ca5d6d38651e7e179b7
-
SHA512
e98fe87f954827b7ebc427f4380927cd4664724a661e97f614601c44d6a999442896218664fee3d8ef5c6119ffc82828699cb13468db8722d7ee2e47e6157dfa
-
SSDEEP
6144:psE3WpQMV/0dfoXvXAa5EQJJf2dKhbrct9lx7lm5b7TiOxU3RUCjj:psFQMGqfwkDaKtovMltq
-
Beds Protector Packer
Detects Beds Protector packer used to load .NET malware.
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-