General
-
Target
c03d1a32826e492be949149e8a410d61_JaffaCakes118
-
Size
438KB
-
Sample
240825-h9ecaasdrd
-
MD5
c03d1a32826e492be949149e8a410d61
-
SHA1
9e1ba141e0d431e4de80919b646a2817be51a9ec
-
SHA256
4efe96995fbf6b6398b515b5fca1b4c4e20b5c2a6fc2403d90a6f5b4debabaa2
-
SHA512
34b8df7905bf76860c3fc222bd75901b0a94c8c372132604bfeb55d641c415faf510efaa945c071199ad7343737d535a4be10071f300cf922c466984b9d30d9d
-
SSDEEP
6144:nu35ArdgTGGO/NmweVgu/D4NcCd84VRDR2IP9zUY8KHPhl6Lq:u35e5Xe6MD4umRMkfsL
Static task
static1
Behavioral task
behavioral1
Sample
c03d1a32826e492be949149e8a410d61_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c03d1a32826e492be949149e8a410d61_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://umarguzardijye.com/work/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
c03d1a32826e492be949149e8a410d61_JaffaCakes118
-
Size
438KB
-
MD5
c03d1a32826e492be949149e8a410d61
-
SHA1
9e1ba141e0d431e4de80919b646a2817be51a9ec
-
SHA256
4efe96995fbf6b6398b515b5fca1b4c4e20b5c2a6fc2403d90a6f5b4debabaa2
-
SHA512
34b8df7905bf76860c3fc222bd75901b0a94c8c372132604bfeb55d641c415faf510efaa945c071199ad7343737d535a4be10071f300cf922c466984b9d30d9d
-
SSDEEP
6144:nu35ArdgTGGO/NmweVgu/D4NcCd84VRDR2IP9zUY8KHPhl6Lq:u35e5Xe6MD4umRMkfsL
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-