General
-
Target
ca5f07b070751014b1c399f9eaa7b936_JaffaCakes118
-
Size
544KB
-
Sample
240830-hlecdaseqp
-
MD5
ca5f07b070751014b1c399f9eaa7b936
-
SHA1
3e4d4578efed968ea70fc4de3998fdc4a43be29d
-
SHA256
e5c5e22fd1d923ae1b1dc02ff99e9739c689cdf211c1e3aca5c6f99be4dbe741
-
SHA512
e6d6c2126fba622127ff89b54511237078ad8f17eb40a9ed97d6fca7ba37232919f8a3bdf9a9e2ad8e4aa80223618acbde0efec7f0c81f3f67d7cb7064bdb196
-
SSDEEP
12288:pjwMhslUIUMVjDZC8SDRiTtDrYLwrlFk1RIctC+esTCm/j:t5OUIUMlDiorqmkXIch2m
Static task
static1
Behavioral task
behavioral1
Sample
ca5f07b070751014b1c399f9eaa7b936_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ca5f07b070751014b1c399f9eaa7b936_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://lokipanelhostingnew.ml/share/dave/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
ca5f07b070751014b1c399f9eaa7b936_JaffaCakes118
-
Size
544KB
-
MD5
ca5f07b070751014b1c399f9eaa7b936
-
SHA1
3e4d4578efed968ea70fc4de3998fdc4a43be29d
-
SHA256
e5c5e22fd1d923ae1b1dc02ff99e9739c689cdf211c1e3aca5c6f99be4dbe741
-
SHA512
e6d6c2126fba622127ff89b54511237078ad8f17eb40a9ed97d6fca7ba37232919f8a3bdf9a9e2ad8e4aa80223618acbde0efec7f0c81f3f67d7cb7064bdb196
-
SSDEEP
12288:pjwMhslUIUMVjDZC8SDRiTtDrYLwrlFk1RIctC+esTCm/j:t5OUIUMlDiorqmkXIch2m
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-