General
-
Target
c421a43f741ad586338b3739bd812b95_JaffaCakes118
-
Size
615KB
-
Sample
240827-bpswlsvgrb
-
MD5
c421a43f741ad586338b3739bd812b95
-
SHA1
442a8888bfc86d52e838a739417f597df12a7845
-
SHA256
faf6ebfff85ddb7f9f7477e5370e564b16febf619e1c865dda506e7649488815
-
SHA512
bef0969463a3130f7d4bcbd9b09b0e85fab4cba74a27ac74cc45e8c43ac54c7833ab1d8fdb648e8d14bd274bebabdc5285fa30f03543e13b32caa41856092ad9
-
SSDEEP
6144:AOeZw9zc/dDwPHgjrGEUgy2mAT2QxKZoKyqvVl:AOeWFc/dgq9UYgOKZC2V
Static task
static1
Behavioral task
behavioral1
Sample
c421a43f741ad586338b3739bd812b95_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c421a43f741ad586338b3739bd812b95_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://89.34.237.212/annonymous/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
c421a43f741ad586338b3739bd812b95_JaffaCakes118
-
Size
615KB
-
MD5
c421a43f741ad586338b3739bd812b95
-
SHA1
442a8888bfc86d52e838a739417f597df12a7845
-
SHA256
faf6ebfff85ddb7f9f7477e5370e564b16febf619e1c865dda506e7649488815
-
SHA512
bef0969463a3130f7d4bcbd9b09b0e85fab4cba74a27ac74cc45e8c43ac54c7833ab1d8fdb648e8d14bd274bebabdc5285fa30f03543e13b32caa41856092ad9
-
SSDEEP
6144:AOeZw9zc/dDwPHgjrGEUgy2mAT2QxKZoKyqvVl:AOeWFc/dgq9UYgOKZC2V
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-