General
-
Target
f0aa504227c9970ab17bd03b8adfafc5_JaffaCakes118
-
Size
236KB
-
Sample
241214-zrlgbawkek
-
MD5
f0aa504227c9970ab17bd03b8adfafc5
-
SHA1
c654db6285cf31312248e9965a806733a7a73c0e
-
SHA256
312c2beeed3d70bec149f1897cb10bd3a07e54ea32ba0bb6a84b69820e5e72a7
-
SHA512
409b2ae2dead2bee7f92eff1693c62b7e88e464c341891fff18795d15cb55a6b5cc8016efb1307f3264edb10873fbdf791c2f423448fcd0be6054e2a0ba2139b
-
SSDEEP
6144:RaEUGMMH4wAeZ9qnwh/eN6z8CdDYbHFaWBghup:R624wH9rn0cWB
Static task
static1
Behavioral task
behavioral1
Sample
f0aa504227c9970ab17bd03b8adfafc5_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
lokibot
http://geranntibankasi.com/corp/nel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
f0aa504227c9970ab17bd03b8adfafc5_JaffaCakes118
-
Size
236KB
-
MD5
f0aa504227c9970ab17bd03b8adfafc5
-
SHA1
c654db6285cf31312248e9965a806733a7a73c0e
-
SHA256
312c2beeed3d70bec149f1897cb10bd3a07e54ea32ba0bb6a84b69820e5e72a7
-
SHA512
409b2ae2dead2bee7f92eff1693c62b7e88e464c341891fff18795d15cb55a6b5cc8016efb1307f3264edb10873fbdf791c2f423448fcd0be6054e2a0ba2139b
-
SSDEEP
6144:RaEUGMMH4wAeZ9qnwh/eN6z8CdDYbHFaWBghup:R624wH9rn0cWB
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-