General
-
Target
f4c4cdf235207edf81bff693e6bebe09_JaffaCakes118
-
Size
895KB
-
Sample
240925-ak55pstcnj
-
MD5
f4c4cdf235207edf81bff693e6bebe09
-
SHA1
0334a706b2c2c18234ae7a82b264f924ffd7b89a
-
SHA256
1ac1653b9124d0914ef509e94d452036461de32b7abf3e170403bcd675c0f7c6
-
SHA512
29984559563711fdfae8ec11ae192d0751c83f576b81a91550fba4520f725380c63a953ce3408ec37f79d10a9d5e90fa9f7dbbabd9fe316bbdba9ee56e45bc7b
-
SSDEEP
24576:WoGe3MxT5GWYiWU/3c2st1W7b0pEbjnXEIGnBWjM1:WtLuWYhNOX8d1
Static task
static1
Behavioral task
behavioral1
Sample
f4c4cdf235207edf81bff693e6bebe09_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://eleletieleleparthard.gq/banky/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
f4c4cdf235207edf81bff693e6bebe09_JaffaCakes118
-
Size
895KB
-
MD5
f4c4cdf235207edf81bff693e6bebe09
-
SHA1
0334a706b2c2c18234ae7a82b264f924ffd7b89a
-
SHA256
1ac1653b9124d0914ef509e94d452036461de32b7abf3e170403bcd675c0f7c6
-
SHA512
29984559563711fdfae8ec11ae192d0751c83f576b81a91550fba4520f725380c63a953ce3408ec37f79d10a9d5e90fa9f7dbbabd9fe316bbdba9ee56e45bc7b
-
SSDEEP
24576:WoGe3MxT5GWYiWU/3c2st1W7b0pEbjnXEIGnBWjM1:WtLuWYhNOX8d1
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-