General
-
Target
714efaea0111306d7ed7f4fefc5793ba_JaffaCakes118
-
Size
441KB
-
Sample
240730-qqq6qs1ckj
-
MD5
714efaea0111306d7ed7f4fefc5793ba
-
SHA1
2918e1a1eec19baf0fd34f4a19671e2ad66b4e1e
-
SHA256
f92c91f6aef77844a6f8a3bdefd114b72fe8dbca6f7cad5fffe82e0da737e1a2
-
SHA512
536527fcc2a0f2c38d723356cb99099b1192feb9dcbf9002ecb09d1a205a5f1df984e4fa41c855eb2c8bf3d15efea5e8f736ff5016476c944e6b32aa29c22b3d
-
SSDEEP
12288:Uwq2j+5vZZ6wAoVAFM0rgGyqP3sm6eP94j6bMNdK:lhjmvT68SFM0TyqPsm6+/
Static task
static1
Behavioral task
behavioral1
Sample
714efaea0111306d7ed7f4fefc5793ba_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
714efaea0111306d7ed7f4fefc5793ba_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
lokibot
http://mflogistics-my.com/chief/har/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
714efaea0111306d7ed7f4fefc5793ba_JaffaCakes118
-
Size
441KB
-
MD5
714efaea0111306d7ed7f4fefc5793ba
-
SHA1
2918e1a1eec19baf0fd34f4a19671e2ad66b4e1e
-
SHA256
f92c91f6aef77844a6f8a3bdefd114b72fe8dbca6f7cad5fffe82e0da737e1a2
-
SHA512
536527fcc2a0f2c38d723356cb99099b1192feb9dcbf9002ecb09d1a205a5f1df984e4fa41c855eb2c8bf3d15efea5e8f736ff5016476c944e6b32aa29c22b3d
-
SSDEEP
12288:Uwq2j+5vZZ6wAoVAFM0rgGyqP3sm6eP94j6bMNdK:lhjmvT68SFM0TyqPsm6+/
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-