General
-
Target
51613d3c02ff020c361baa8e753baecc_JaffaCakes118
-
Size
370KB
-
Sample
240729-tkz38s1apf
-
MD5
51613d3c02ff020c361baa8e753baecc
-
SHA1
f07665774e22bbf978d32db4988e03b4cd644c42
-
SHA256
5b33d0b9c6e4adc3e453adaa5205a07c05b24ba5e784e53905bc0428c11e9f8b
-
SHA512
d38da3ce7eecd3b445c41fc2fcc8633c583e2df61f7277c7f408c689008df33c8547f590e1175f0272f1c52ffaa2692068c8c2e3e521204d1a7533ea03f4db30
-
SSDEEP
6144:mAPc0Oksx85QuVnizQcce08yIO5SMvqz25JDgksL6NjzWohHhUzZ4nI8:mTb3859oQcce08AdvP5JDJWMHWZ
Behavioral task
behavioral1
Sample
51613d3c02ff020c361baa8e753baecc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
51613d3c02ff020c361baa8e753baecc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
lokibot
http://89.46.223.82/cebral/solar/gem/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
51613d3c02ff020c361baa8e753baecc_JaffaCakes118
-
Size
370KB
-
MD5
51613d3c02ff020c361baa8e753baecc
-
SHA1
f07665774e22bbf978d32db4988e03b4cd644c42
-
SHA256
5b33d0b9c6e4adc3e453adaa5205a07c05b24ba5e784e53905bc0428c11e9f8b
-
SHA512
d38da3ce7eecd3b445c41fc2fcc8633c583e2df61f7277c7f408c689008df33c8547f590e1175f0272f1c52ffaa2692068c8c2e3e521204d1a7533ea03f4db30
-
SSDEEP
6144:mAPc0Oksx85QuVnizQcce08yIO5SMvqz25JDgksL6NjzWohHhUzZ4nI8:mTb3859oQcce08AdvP5JDJWMHWZ
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-