General
-
Target
1f3e7471992c8c73045f8252cc8fbbd2_JaffaCakes118
-
Size
1000KB
-
Sample
241008-dkqa2awbnr
-
MD5
1f3e7471992c8c73045f8252cc8fbbd2
-
SHA1
33a80c85bb0166ce2e23e92ea89e81c39741804e
-
SHA256
f048951f137dd2be3e7efad959b9f7657f74f6fca663a97a70060ea3549df8fc
-
SHA512
f2f954147c16b97c69ccf19352f02b74af938291d171932c07e6547de4a57e6e94e0304b17966fa3ba0b2974a175d7a96adb1f9811434b363084fe5c4884ae27
-
SSDEEP
12288:GcssN201mLbflj1FHK7zSvAq5bUnv78WVXICm9JPrFNYPABBu9dxrkAt9VjW:R1mXfJ1IOAq5bG/4CmAPAw1T3VjW
Static task
static1
Behavioral task
behavioral1
Sample
1f3e7471992c8c73045f8252cc8fbbd2_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
lokibot
http://185.227.139.5/sxisodifntose.php/RT1IZ0WsI3zCW
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
1f3e7471992c8c73045f8252cc8fbbd2_JaffaCakes118
-
Size
1000KB
-
MD5
1f3e7471992c8c73045f8252cc8fbbd2
-
SHA1
33a80c85bb0166ce2e23e92ea89e81c39741804e
-
SHA256
f048951f137dd2be3e7efad959b9f7657f74f6fca663a97a70060ea3549df8fc
-
SHA512
f2f954147c16b97c69ccf19352f02b74af938291d171932c07e6547de4a57e6e94e0304b17966fa3ba0b2974a175d7a96adb1f9811434b363084fe5c4884ae27
-
SSDEEP
12288:GcssN201mLbflj1FHK7zSvAq5bUnv78WVXICm9JPrFNYPABBu9dxrkAt9VjW:R1mXfJ1IOAq5bG/4CmAPAw1T3VjW
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-