General
-
Target
b3690132e90a12ed78b6938026650c06_JaffaCakes118
-
Size
548KB
-
Sample
240821-pdxbjsxgkb
-
MD5
b3690132e90a12ed78b6938026650c06
-
SHA1
366805bd005f28cbf8fc5e60bcdac47c19d451b9
-
SHA256
63e68b293dfeb12309b4f814f2ffbdf0af7908d181c0e2c8f8c83f5af1ec7844
-
SHA512
3c64b2eb7d2bd9a04ef9f5e68cd84c413359c1585f7040929c992388889aec98df37538930038951e9e4514f8de5f66553027f41c60c26beaa4a9461add33133
-
SSDEEP
12288:QWB7drk5Tc1COmuIayu3otTYIHHVhu1qX:Nrk5Tc6uhyu4dvBX
Static task
static1
Behavioral task
behavioral1
Sample
b3690132e90a12ed78b6938026650c06_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b3690132e90a12ed78b6938026650c06_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://mecharnise.ir/ea10/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
b3690132e90a12ed78b6938026650c06_JaffaCakes118
-
Size
548KB
-
MD5
b3690132e90a12ed78b6938026650c06
-
SHA1
366805bd005f28cbf8fc5e60bcdac47c19d451b9
-
SHA256
63e68b293dfeb12309b4f814f2ffbdf0af7908d181c0e2c8f8c83f5af1ec7844
-
SHA512
3c64b2eb7d2bd9a04ef9f5e68cd84c413359c1585f7040929c992388889aec98df37538930038951e9e4514f8de5f66553027f41c60c26beaa4a9461add33133
-
SSDEEP
12288:QWB7drk5Tc1COmuIayu3otTYIHHVhu1qX:Nrk5Tc6uhyu4dvBX
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-