General
-
Target
aea1abea774ec177a90d6e36707e944a_JaffaCakes118
-
Size
399KB
-
Sample
241129-d4appaspfx
-
MD5
aea1abea774ec177a90d6e36707e944a
-
SHA1
9aa53227fe90dd8e976ffde57d0409171a0856f1
-
SHA256
c7d0361fe4ffb35e685f172468a532c9c50f136bd54ac8225db1c96b9942edbe
-
SHA512
a4720a274157614df1dc601f9755623f22ca6c6b8c7ae276fe4682983fc058815faeb3d34a49a8c7d35552aada06f32bdc30fae8072a29e95cee0ac1b522bcf4
-
SSDEEP
6144:qtigBv3isq1VRc9BmFbLEGZDRi5e/qcs6duMXJLkArl0sEu:w7M89iLzRPqcs6duG0sH
Static task
static1
Behavioral task
behavioral1
Sample
aea1abea774ec177a90d6e36707e944a_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
aea1abea774ec177a90d6e36707e944a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lokibot
http://ctp1.xyz/w2/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
aea1abea774ec177a90d6e36707e944a_JaffaCakes118
-
Size
399KB
-
MD5
aea1abea774ec177a90d6e36707e944a
-
SHA1
9aa53227fe90dd8e976ffde57d0409171a0856f1
-
SHA256
c7d0361fe4ffb35e685f172468a532c9c50f136bd54ac8225db1c96b9942edbe
-
SHA512
a4720a274157614df1dc601f9755623f22ca6c6b8c7ae276fe4682983fc058815faeb3d34a49a8c7d35552aada06f32bdc30fae8072a29e95cee0ac1b522bcf4
-
SSDEEP
6144:qtigBv3isq1VRc9BmFbLEGZDRi5e/qcs6duMXJLkArl0sEu:w7M89iLzRPqcs6duG0sH
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-