General
-
Target
47f73b541c0bb1950fba158136881eec_JaffaCakes118
-
Size
871KB
-
Sample
240715-dpxkxavgpm
-
MD5
47f73b541c0bb1950fba158136881eec
-
SHA1
d395e1f33c689c35107fc2dc2c3e82f048ba2a37
-
SHA256
e2e5d2cb61ec3f3f01e17ac8dff23a4e1cbfd9059e9b58646e68a757a1cc976d
-
SHA512
301d002428d63d76c74f252a2fd1183de69a7f7cece1448be667fca02831338f64a0cfa7f9211334c2ea8389fe7d16274a3e301fe9bc23bb89ea7aa360e953ea
-
SSDEEP
12288:F0V3xaSQYl6UGiQ5s3XcVd03NCqV5o/JYL:F0NxaYtGims3MVadCqV54J
Static task
static1
Behavioral task
behavioral1
Sample
47f73b541c0bb1950fba158136881eec_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
47f73b541c0bb1950fba158136881eec_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
lokibot
http://transcorpoil.com/dumbo/dumbo4/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
47f73b541c0bb1950fba158136881eec_JaffaCakes118
-
Size
871KB
-
MD5
47f73b541c0bb1950fba158136881eec
-
SHA1
d395e1f33c689c35107fc2dc2c3e82f048ba2a37
-
SHA256
e2e5d2cb61ec3f3f01e17ac8dff23a4e1cbfd9059e9b58646e68a757a1cc976d
-
SHA512
301d002428d63d76c74f252a2fd1183de69a7f7cece1448be667fca02831338f64a0cfa7f9211334c2ea8389fe7d16274a3e301fe9bc23bb89ea7aa360e953ea
-
SSDEEP
12288:F0V3xaSQYl6UGiQ5s3XcVd03NCqV5o/JYL:F0NxaYtGims3MVadCqV54J
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-