General
-
Target
ad7d7f4c9bb6f118eaeb64d69cce1393_JaffaCakes118
-
Size
489KB
-
Sample
240820-cj9gvaydke
-
MD5
ad7d7f4c9bb6f118eaeb64d69cce1393
-
SHA1
70babe9dcdf1850c2d1fe7300866cbe8513625d8
-
SHA256
4c4420fc8167dc9d7a4bae0c3fc92ffd5bc3217e0c0eab1ba931cc1930233296
-
SHA512
48be791eea9049517769978de24854acf17a5de511d23b9b7871ecfbb5d2b36119fe852a13dee1b3085ff5d0532d80624dd81dc47c354b7b19e99291dcc776f8
-
SSDEEP
12288:8Fda+Fda7CbYQjoiuN3JO7EWCTT2AZnreZQAf:NCbYQjoBN3Jz5tr
Static task
static1
Behavioral task
behavioral1
Sample
ad7d7f4c9bb6f118eaeb64d69cce1393_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ad7d7f4c9bb6f118eaeb64d69cce1393_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://51.195.53.221/p.php/9jOsfsOpZTcJM
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
ad7d7f4c9bb6f118eaeb64d69cce1393_JaffaCakes118
-
Size
489KB
-
MD5
ad7d7f4c9bb6f118eaeb64d69cce1393
-
SHA1
70babe9dcdf1850c2d1fe7300866cbe8513625d8
-
SHA256
4c4420fc8167dc9d7a4bae0c3fc92ffd5bc3217e0c0eab1ba931cc1930233296
-
SHA512
48be791eea9049517769978de24854acf17a5de511d23b9b7871ecfbb5d2b36119fe852a13dee1b3085ff5d0532d80624dd81dc47c354b7b19e99291dcc776f8
-
SSDEEP
12288:8Fda+Fda7CbYQjoiuN3JO7EWCTT2AZnreZQAf:NCbYQjoBN3Jz5tr
-
Beds Protector Packer
Detects Beds Protector packer used to load .NET malware.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-