General
-
Target
3b99b7ad44158bb1a6a3692c5c7fe141_JaffaCakes118
-
Size
488KB
-
Sample
240729-htjxtssbje
-
MD5
3b99b7ad44158bb1a6a3692c5c7fe141
-
SHA1
3c8dd20aa5c958985684768b84eaf3a9eb338df8
-
SHA256
621be60fa8bff2b5213da684f43a00e25eb9f379f80e64f9ca85cad70dece42b
-
SHA512
bcf1688f2989811ba968e93e3c4277675c42a147769dd9a833652384c241fb0e4998ccefb3a94c16cbb2991c2ddf0ac03266fb4e2472e614be421aad14fa27ab
-
SSDEEP
6144:yLmT89QO9uFWw7xcG19FIWTyF+m9vpUesKQ28yZHjH9xQQJXyiLgla/bako4y:oZG++ruF+UUei2rdlXyegsPo/
Static task
static1
Behavioral task
behavioral1
Sample
3b99b7ad44158bb1a6a3692c5c7fe141_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b99b7ad44158bb1a6a3692c5c7fe141_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
lokibot
http://babaseoa.com/cartel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
3b99b7ad44158bb1a6a3692c5c7fe141_JaffaCakes118
-
Size
488KB
-
MD5
3b99b7ad44158bb1a6a3692c5c7fe141
-
SHA1
3c8dd20aa5c958985684768b84eaf3a9eb338df8
-
SHA256
621be60fa8bff2b5213da684f43a00e25eb9f379f80e64f9ca85cad70dece42b
-
SHA512
bcf1688f2989811ba968e93e3c4277675c42a147769dd9a833652384c241fb0e4998ccefb3a94c16cbb2991c2ddf0ac03266fb4e2472e614be421aad14fa27ab
-
SSDEEP
6144:yLmT89QO9uFWw7xcG19FIWTyF+m9vpUesKQ28yZHjH9xQQJXyiLgla/bako4y:oZG++ruF+UUei2rdlXyegsPo/
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-