General
-
Target
44f81e5101dda242fc637fdff4453fee_JaffaCakes118
-
Size
492KB
-
Sample
241015-az6psavcle
-
MD5
44f81e5101dda242fc637fdff4453fee
-
SHA1
c98a79cd12be71ded99b8c4469c786bf1a4ba0e4
-
SHA256
617989d96db98d330d3238c35fe165a4f5dc8b5e2faf09fd9041c8558d9d91c8
-
SHA512
73311ef360bdbdbc8e860c749720512a11d1687077c86de963b2c5e9925ba9cee18672de6e0d865dddd7dcdf193d8c037683ca4f7fefa56c3690a589c1f7e358
-
SSDEEP
12288:TohvQJ31CPLx7G3qsJRpN3lswYlMNxUSa3f/Y:EhoCLZG3qSFl5YuxUSMfA
Behavioral task
behavioral1
Sample
44f81e5101dda242fc637fdff4453fee_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
44f81e5101dda242fc637fdff4453fee_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lokibot
http://parkrosegroup.info/lewy/sun/ernest/solar/gem/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
44f81e5101dda242fc637fdff4453fee_JaffaCakes118
-
Size
492KB
-
MD5
44f81e5101dda242fc637fdff4453fee
-
SHA1
c98a79cd12be71ded99b8c4469c786bf1a4ba0e4
-
SHA256
617989d96db98d330d3238c35fe165a4f5dc8b5e2faf09fd9041c8558d9d91c8
-
SHA512
73311ef360bdbdbc8e860c749720512a11d1687077c86de963b2c5e9925ba9cee18672de6e0d865dddd7dcdf193d8c037683ca4f7fefa56c3690a589c1f7e358
-
SSDEEP
12288:TohvQJ31CPLx7G3qsJRpN3lswYlMNxUSa3f/Y:EhoCLZG3qSFl5YuxUSMfA
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-