General
-
Target
7aa1a4ed6b8776c2b2ba5c999c6a5d22_JaffaCakes118
-
Size
648KB
-
Sample
240731-a1cs4axdkk
-
MD5
7aa1a4ed6b8776c2b2ba5c999c6a5d22
-
SHA1
b30d9bb52aaa3024eec9a3c662b6e19265cc3cf2
-
SHA256
bc9084e36a37d02f116740df25e23a40ef3902a3e2da11cc94861f5a71d31377
-
SHA512
f2e164f190251795a4ba5758bfa8fd703e5df950b624a8efc2dfac95580159efa5b50c35f425efa0e0d438404cdaa8699918c0e21c97e20a08c28ceacbfaadea
-
SSDEEP
12288:Fn95fBkDkiKDhab2TCvM6ZQz/pusP/7PEHOTDY7idSI9se5pZQcTc4bEpfpghVfU:R9xBZjw8CvVQrQuDmwDTVy
Static task
static1
Behavioral task
behavioral1
Sample
7aa1a4ed6b8776c2b2ba5c999c6a5d22_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7aa1a4ed6b8776c2b2ba5c999c6a5d22_JaffaCakes118.exe
Resource
win10v2004-20240730-en
Malware Config
Extracted
lokibot
http://195.69.140.147/.op/cr.php/xUSLz59kCLo7F
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
7aa1a4ed6b8776c2b2ba5c999c6a5d22_JaffaCakes118
-
Size
648KB
-
MD5
7aa1a4ed6b8776c2b2ba5c999c6a5d22
-
SHA1
b30d9bb52aaa3024eec9a3c662b6e19265cc3cf2
-
SHA256
bc9084e36a37d02f116740df25e23a40ef3902a3e2da11cc94861f5a71d31377
-
SHA512
f2e164f190251795a4ba5758bfa8fd703e5df950b624a8efc2dfac95580159efa5b50c35f425efa0e0d438404cdaa8699918c0e21c97e20a08c28ceacbfaadea
-
SSDEEP
12288:Fn95fBkDkiKDhab2TCvM6ZQz/pusP/7PEHOTDY7idSI9se5pZQcTc4bEpfpghVfU:R9xBZjw8CvVQrQuDmwDTVy
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-