General
-
Target
64284a2087bf0cd17b4f7391b4e15f99_JaffaCakes118
-
Size
596KB
-
Sample
241020-1bhads1dmc
-
MD5
64284a2087bf0cd17b4f7391b4e15f99
-
SHA1
804525fd688201657c3c96c5722c1b5dd4eb34c8
-
SHA256
f9ad9f2cb7edd7695a961472ba0e67695530e98e0b81d1be4880dfe383486e5e
-
SHA512
ba3f12fd08a0883b69b7585003bd03a48bcefa5433f96c91aae157ded66e10a2f79365d93b6fc2cfac147c94b1b4aa80766b303f48380be0ad5c553277fa6522
-
SSDEEP
12288:qOOs1KJl6G0Ku6HKDJEq/y6INX6LRgU7e9uNSEl0S:/xckGq/wKgD2
Static task
static1
Behavioral task
behavioral1
Sample
64284a2087bf0cd17b4f7391b4e15f99_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://apponline354.ir/chibyk/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
64284a2087bf0cd17b4f7391b4e15f99_JaffaCakes118
-
Size
596KB
-
MD5
64284a2087bf0cd17b4f7391b4e15f99
-
SHA1
804525fd688201657c3c96c5722c1b5dd4eb34c8
-
SHA256
f9ad9f2cb7edd7695a961472ba0e67695530e98e0b81d1be4880dfe383486e5e
-
SHA512
ba3f12fd08a0883b69b7585003bd03a48bcefa5433f96c91aae157ded66e10a2f79365d93b6fc2cfac147c94b1b4aa80766b303f48380be0ad5c553277fa6522
-
SSDEEP
12288:qOOs1KJl6G0Ku6HKDJEq/y6INX6LRgU7e9uNSEl0S:/xckGq/wKgD2
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-