General
-
Target
c691a91aecdef4e239ec3167010fc0f7_JaffaCakes118
-
Size
612KB
-
Sample
240828-k8nwfasfph
-
MD5
c691a91aecdef4e239ec3167010fc0f7
-
SHA1
89815e76e04ba6a255ea622db0d8c14504221b7f
-
SHA256
3489069aff3395387f1ac8c700c12008bc6158aac3dc2109c077350231aaf763
-
SHA512
d69ba157b54c422688722c6d9f02e54657803fb5034bc557c72d5a6f29a8b077f2b42eadddaa4f2a8f3c23b4673b31ed9b0dea47e753bae5c0549108be5ce7c3
-
SSDEEP
12288:TE+zLqBmrA2LTz7H5JPiYltjzu8+H214q1m4ElZzAJWQx:TEEmBoZT5JPjt1+khuZzAIQ
Static task
static1
Behavioral task
behavioral1
Sample
c691a91aecdef4e239ec3167010fc0f7_JaffaCakes118.msi
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c691a91aecdef4e239ec3167010fc0f7_JaffaCakes118.msi
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://31.220.2.200/~justicet/em/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
c691a91aecdef4e239ec3167010fc0f7_JaffaCakes118
-
Size
612KB
-
MD5
c691a91aecdef4e239ec3167010fc0f7
-
SHA1
89815e76e04ba6a255ea622db0d8c14504221b7f
-
SHA256
3489069aff3395387f1ac8c700c12008bc6158aac3dc2109c077350231aaf763
-
SHA512
d69ba157b54c422688722c6d9f02e54657803fb5034bc557c72d5a6f29a8b077f2b42eadddaa4f2a8f3c23b4673b31ed9b0dea47e753bae5c0549108be5ce7c3
-
SSDEEP
12288:TE+zLqBmrA2LTz7H5JPiYltjzu8+H214q1m4ElZzAJWQx:TEEmBoZT5JPjt1+khuZzAIQ
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1