General
-
Target
b7af0237f418c2b71cbec45b9bef798f_JaffaCakes118
-
Size
632KB
-
Sample
240822-pxs38szglp
-
MD5
b7af0237f418c2b71cbec45b9bef798f
-
SHA1
7963d66be9666d4c228521103c421182ff048660
-
SHA256
f8ca269b6f3f8dd0b7221ec2611083ff170fb9b53b91fdafc2f4bf102ab48ae0
-
SHA512
933f4408afcacd291576caf003c53d77e9abc12a44048931d1ed8073038e6b7554775e9854f94998d92ee282c17e521ff9f65a9b9b23d7d91f5e4ee87570c806
-
SSDEEP
12288:JLKzCZi970Oz6hGyvb+VeZFyru3oPeFrAb6cdeEcQ6pp0GZQYEdJGizvsARlquXK:JWzCZ7jeeoPyrAb6cFcQmp0GT
Static task
static1
Behavioral task
behavioral1
Sample
b7af0237f418c2b71cbec45b9bef798f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b7af0237f418c2b71cbec45b9bef798f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://79.124.8.6/plesk-site-preview/bosungind-kr.co/https/79.124.8.6/tmoni/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
b7af0237f418c2b71cbec45b9bef798f_JaffaCakes118
-
Size
632KB
-
MD5
b7af0237f418c2b71cbec45b9bef798f
-
SHA1
7963d66be9666d4c228521103c421182ff048660
-
SHA256
f8ca269b6f3f8dd0b7221ec2611083ff170fb9b53b91fdafc2f4bf102ab48ae0
-
SHA512
933f4408afcacd291576caf003c53d77e9abc12a44048931d1ed8073038e6b7554775e9854f94998d92ee282c17e521ff9f65a9b9b23d7d91f5e4ee87570c806
-
SSDEEP
12288:JLKzCZi970Oz6hGyvb+VeZFyru3oPeFrAb6cdeEcQ6pp0GZQYEdJGizvsARlquXK:JWzCZ7jeeoPyrAb6cFcQmp0GT
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-