General
-
Target
c915841a4eb00c3079f64a7dc369b5f6_JaffaCakes118
-
Size
320KB
-
Sample
240829-sp74zazgrk
-
MD5
c915841a4eb00c3079f64a7dc369b5f6
-
SHA1
3dee99e7e5a550dfdfec8c4d203b85a7687bc8b4
-
SHA256
60d0ec26812039a01f693d6726fc116a549c9924ce3eb52f2b0a5f44a01f8f84
-
SHA512
cdf927e1772fdca17ade5f7c25a070fd76d87ca85110abe4038f484141878a3c0750668ec62b7811b4e4e3ad73c5e6d7c24a1258bc2f7612b804498dfb4015d4
-
SSDEEP
6144:eRviASYpvoDQyMxVzI+61qFjGFo3Iwb3hylIx0cvLsUBNqGnC11aHR8U8jA7BZ:eViA9RoDQyMxP68FiMIa3h2mgcqGCfc4
Static task
static1
Behavioral task
behavioral1
Sample
c915841a4eb00c3079f64a7dc369b5f6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c915841a4eb00c3079f64a7dc369b5f6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://smundukdapodik.sch.id/sql/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
c915841a4eb00c3079f64a7dc369b5f6_JaffaCakes118
-
Size
320KB
-
MD5
c915841a4eb00c3079f64a7dc369b5f6
-
SHA1
3dee99e7e5a550dfdfec8c4d203b85a7687bc8b4
-
SHA256
60d0ec26812039a01f693d6726fc116a549c9924ce3eb52f2b0a5f44a01f8f84
-
SHA512
cdf927e1772fdca17ade5f7c25a070fd76d87ca85110abe4038f484141878a3c0750668ec62b7811b4e4e3ad73c5e6d7c24a1258bc2f7612b804498dfb4015d4
-
SSDEEP
6144:eRviASYpvoDQyMxVzI+61qFjGFo3Iwb3hylIx0cvLsUBNqGnC11aHR8U8jA7BZ:eViA9RoDQyMxP68FiMIa3h2mgcqGCfc4
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-