General
-
Target
c557a5fc570645a3b9361339ca58205c_JaffaCakes118
-
Size
660KB
-
Sample
240827-tnmbjs1dkp
-
MD5
c557a5fc570645a3b9361339ca58205c
-
SHA1
2c6b9b3fe7c4dd21f9305006f972b2788fe5617f
-
SHA256
1bc133e40e453e4104be815ea7e980d1f47b9941fff5e3ec668d9d0b096fa841
-
SHA512
7b790eb2968d4f9eab4fa67af7ef2a78691446d862c29ccad3aff1d1c096ee6a4656ab9fb2b946bcef59fbf1417105d90d0e59440ff06c63f7fbec13542bab70
-
SSDEEP
12288:b1eRRAfxCIUnyNOI/SN/HWQZUpOIn6v6J7M:5iRO8nyNOI0u7AIn6Sm
Static task
static1
Behavioral task
behavioral1
Sample
c557a5fc570645a3b9361339ca58205c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c557a5fc570645a3b9361339ca58205c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://joovy.ga/chang/gate.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
c557a5fc570645a3b9361339ca58205c_JaffaCakes118
-
Size
660KB
-
MD5
c557a5fc570645a3b9361339ca58205c
-
SHA1
2c6b9b3fe7c4dd21f9305006f972b2788fe5617f
-
SHA256
1bc133e40e453e4104be815ea7e980d1f47b9941fff5e3ec668d9d0b096fa841
-
SHA512
7b790eb2968d4f9eab4fa67af7ef2a78691446d862c29ccad3aff1d1c096ee6a4656ab9fb2b946bcef59fbf1417105d90d0e59440ff06c63f7fbec13542bab70
-
SSDEEP
12288:b1eRRAfxCIUnyNOI/SN/HWQZUpOIn6v6J7M:5iRO8nyNOI0u7AIn6Sm
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-