General
-
Target
8ad87cebd9aaadd8a385fa504863e532_JaffaCakes118
-
Size
427KB
-
Sample
240811-sjdceaygpc
-
MD5
8ad87cebd9aaadd8a385fa504863e532
-
SHA1
68e8214ff89b2c93f147bdc797889b25b85a2ee5
-
SHA256
ef44e807ff152bb2c5f6ed11f573087872f0fdf1baaa0e31b7767c5723e503e7
-
SHA512
53c88bce7495219b6b35bfaba1756ed04ba8ac9a05ededcd7752a4656369cf492d111b4b823c93e57ed41379eeb71e027446990e600216ba23ed427946201037
-
SSDEEP
6144:IBb6rFigZaGASvJfbwhmxdPpndlNWrG9mx3Xf1pM4+h+0LX:IBGYgZTA+9bwUnwrGYrpZGL
Static task
static1
Behavioral task
behavioral1
Sample
8ad87cebd9aaadd8a385fa504863e532_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8ad87cebd9aaadd8a385fa504863e532_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
https://www.ritcophysiotherapy.com.au/wap121/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
8ad87cebd9aaadd8a385fa504863e532_JaffaCakes118
-
Size
427KB
-
MD5
8ad87cebd9aaadd8a385fa504863e532
-
SHA1
68e8214ff89b2c93f147bdc797889b25b85a2ee5
-
SHA256
ef44e807ff152bb2c5f6ed11f573087872f0fdf1baaa0e31b7767c5723e503e7
-
SHA512
53c88bce7495219b6b35bfaba1756ed04ba8ac9a05ededcd7752a4656369cf492d111b4b823c93e57ed41379eeb71e027446990e600216ba23ed427946201037
-
SSDEEP
6144:IBb6rFigZaGASvJfbwhmxdPpndlNWrG9mx3Xf1pM4+h+0LX:IBGYgZTA+9bwUnwrGYrpZGL
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-