General
-
Target
c168a1ec781a5d8fb3721eced590c945_JaffaCakes118
-
Size
856KB
-
Sample
240825-x2arfszgme
-
MD5
c168a1ec781a5d8fb3721eced590c945
-
SHA1
4e4287edc588dcac05484f22eecbcf07ef5beeaa
-
SHA256
1b1e8f0f724dd020ae8b5efde0e654b4e55b76d2f3c1cbbfa64eb5915ffa0fe2
-
SHA512
bcd473304da4e2e3c0282243a821c823957f9a0034f3cfc978296d38e7661948fe489c97bf856e29ddcb6f558d9a6a7613f6f5d91d79867332f62e9401a7e45d
-
SSDEEP
12288:6lhAE+ACQUoMbKAn6wRt+50pt78pUC8an8pUC8aUmrCGceRpDUmXL193Z1EXK:wvCQUoMbKK3Z8N8rdcMpDFL1Rw6
Static task
static1
Behavioral task
behavioral1
Sample
c168a1ec781a5d8fb3721eced590c945_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c168a1ec781a5d8fb3721eced590c945_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://becharnise.ir/fa11/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
c168a1ec781a5d8fb3721eced590c945_JaffaCakes118
-
Size
856KB
-
MD5
c168a1ec781a5d8fb3721eced590c945
-
SHA1
4e4287edc588dcac05484f22eecbcf07ef5beeaa
-
SHA256
1b1e8f0f724dd020ae8b5efde0e654b4e55b76d2f3c1cbbfa64eb5915ffa0fe2
-
SHA512
bcd473304da4e2e3c0282243a821c823957f9a0034f3cfc978296d38e7661948fe489c97bf856e29ddcb6f558d9a6a7613f6f5d91d79867332f62e9401a7e45d
-
SSDEEP
12288:6lhAE+ACQUoMbKAn6wRt+50pt78pUC8an8pUC8aUmrCGceRpDUmXL193Z1EXK:wvCQUoMbKK3Z8N8rdcMpDFL1Rw6
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-