General
-
Target
57e6f6a7c2b3dbe90dee739cdaa87f52_JaffaCakes118
-
Size
227KB
-
Sample
241018-rmyxva1eke
-
MD5
57e6f6a7c2b3dbe90dee739cdaa87f52
-
SHA1
b47154192ab3356fd03ecd85cf14fbac9cf06e04
-
SHA256
404ef33e86cd5e9d6705041d1bdf7e39108cd87705a83f53b8abb77a036340db
-
SHA512
af5cc7ba1a0d5707b3460e13757f2d6665364a3bd5130e3b58d347b611f3926bc04dc58fbc7af35c3ac752b541a1ce03383c217c3c42d7887820f7fcd6fafa70
-
SSDEEP
6144:v7+50dm0EVZteFX5z8V693ZlSxI9Dp7crx:7hELtmnzV4rx
Static task
static1
Behavioral task
behavioral1
Sample
57e6f6a7c2b3dbe90dee739cdaa87f52_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
57e6f6a7c2b3dbe90dee739cdaa87f52_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lokibot
http://185.227.139.5/sxisodifntose.php/XjjuWy0TVqjre
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
57e6f6a7c2b3dbe90dee739cdaa87f52_JaffaCakes118
-
Size
227KB
-
MD5
57e6f6a7c2b3dbe90dee739cdaa87f52
-
SHA1
b47154192ab3356fd03ecd85cf14fbac9cf06e04
-
SHA256
404ef33e86cd5e9d6705041d1bdf7e39108cd87705a83f53b8abb77a036340db
-
SHA512
af5cc7ba1a0d5707b3460e13757f2d6665364a3bd5130e3b58d347b611f3926bc04dc58fbc7af35c3ac752b541a1ce03383c217c3c42d7887820f7fcd6fafa70
-
SSDEEP
6144:v7+50dm0EVZteFX5z8V693ZlSxI9Dp7crx:7hELtmnzV4rx
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-