General
-
Target
2b4e4927d94439aefacd34370c0bdc25_JaffaCakes118
-
Size
666KB
-
Sample
240728-3mxkka1fjq
-
MD5
2b4e4927d94439aefacd34370c0bdc25
-
SHA1
71ef96b3073d0b730c980ce3d629f3138ce8448f
-
SHA256
fc27d5975a0b1b0f856f57dd5839cd081efde7a6fc228a5ddbdb57ef4bf1a9c3
-
SHA512
b833af5509052fbb83090f568b66c62e3e91ed493448d3e9f5a26628f8da34da233baa23437a58c2d7842351eeacfb3e21290af6c350058d0771869f156a0baf
-
SSDEEP
12288:KOL2EC+KNAlnSVi4dVNkKQqdiuV7a+u9LjyX21gi2Dtw:KGRYAlnG7T9V7a71j8ygPDe
Static task
static1
Behavioral task
behavioral1
Sample
2b4e4927d94439aefacd34370c0bdc25_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2b4e4927d94439aefacd34370c0bdc25_JaffaCakes118.exe
Resource
win10v2004-20240730-en
Malware Config
Extracted
lokibot
http://195.69.140.147/.op/cr.php/3IAhLIb1TTSzV
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
2b4e4927d94439aefacd34370c0bdc25_JaffaCakes118
-
Size
666KB
-
MD5
2b4e4927d94439aefacd34370c0bdc25
-
SHA1
71ef96b3073d0b730c980ce3d629f3138ce8448f
-
SHA256
fc27d5975a0b1b0f856f57dd5839cd081efde7a6fc228a5ddbdb57ef4bf1a9c3
-
SHA512
b833af5509052fbb83090f568b66c62e3e91ed493448d3e9f5a26628f8da34da233baa23437a58c2d7842351eeacfb3e21290af6c350058d0771869f156a0baf
-
SSDEEP
12288:KOL2EC+KNAlnSVi4dVNkKQqdiuV7a+u9LjyX21gi2Dtw:KGRYAlnG7T9V7a71j8ygPDe
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-