General
-
Target
b2a93e02e21a34d539d6d547a1261aec_JaffaCakes118
-
Size
837KB
-
Sample
240821-jrjdysxcrb
-
MD5
b2a93e02e21a34d539d6d547a1261aec
-
SHA1
c7e7e6fbf2d07a4f8c86c6124f35fde39431d9a4
-
SHA256
93380d54665b9d9ccbda996d1ddd123b08ce9721cb5d15a92b273eba3873f399
-
SHA512
2923b489e6969fb334c8b9850257ec72ce991eea94ae7ab59cc88394d6afdbda06a0cc977b7d8561cfd4040180f516fcc0a638d959f6e14d295c04e1aaa28b20
-
SSDEEP
12288:N959ABbJ++mhtW7+0hKspElJ2+dy4q1WYsdBAqQRmErk9mZ8vJO8uPqxXAE2AZkt:RuBbJ+t+7+tspEzy4q4dP
Static task
static1
Behavioral task
behavioral1
Sample
b2a93e02e21a34d539d6d547a1261aec_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b2a93e02e21a34d539d6d547a1261aec_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://51.195.53.221/p.php/qElaNgWyezEFV
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
b2a93e02e21a34d539d6d547a1261aec_JaffaCakes118
-
Size
837KB
-
MD5
b2a93e02e21a34d539d6d547a1261aec
-
SHA1
c7e7e6fbf2d07a4f8c86c6124f35fde39431d9a4
-
SHA256
93380d54665b9d9ccbda996d1ddd123b08ce9721cb5d15a92b273eba3873f399
-
SHA512
2923b489e6969fb334c8b9850257ec72ce991eea94ae7ab59cc88394d6afdbda06a0cc977b7d8561cfd4040180f516fcc0a638d959f6e14d295c04e1aaa28b20
-
SSDEEP
12288:N959ABbJ++mhtW7+0hKspElJ2+dy4q1WYsdBAqQRmErk9mZ8vJO8uPqxXAE2AZkt:RuBbJ+t+7+tspEzy4q4dP
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-