General
-
Target
cd23b9710a6f3bddf569663eca410316_JaffaCakes118
-
Size
428KB
-
Sample
240831-tpphastapb
-
MD5
cd23b9710a6f3bddf569663eca410316
-
SHA1
26afee2a515aa7c0d2ab691fadd85bfc948dcfbe
-
SHA256
193e8868bf9fbb4fc5edb8a0e2400796ee644114d8a401c8550ce0aa958665ac
-
SHA512
789589860b13b580604be4d7127bc340cc0d29bcf8e6cb6a9259bbf4623033f96addc41b1df41850ee273c9e642730cff5dbc54d75171bdf9caa727cd4ab13cd
-
SSDEEP
12288:sEfBZl1vvNQSnTlBZl1vvNQSnTnHrpq0sU5:sEJ1vvNQQTz1vvNQQTNq0x
Static task
static1
Behavioral task
behavioral1
Sample
cd23b9710a6f3bddf569663eca410316_JaffaCakes118.msi
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cd23b9710a6f3bddf569663eca410316_JaffaCakes118.msi
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://pms-ne.kr/ikloki/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
cd23b9710a6f3bddf569663eca410316_JaffaCakes118
-
Size
428KB
-
MD5
cd23b9710a6f3bddf569663eca410316
-
SHA1
26afee2a515aa7c0d2ab691fadd85bfc948dcfbe
-
SHA256
193e8868bf9fbb4fc5edb8a0e2400796ee644114d8a401c8550ce0aa958665ac
-
SHA512
789589860b13b580604be4d7127bc340cc0d29bcf8e6cb6a9259bbf4623033f96addc41b1df41850ee273c9e642730cff5dbc54d75171bdf9caa727cd4ab13cd
-
SSDEEP
12288:sEfBZl1vvNQSnTlBZl1vvNQSnTnHrpq0sU5:sEJ1vvNQQTz1vvNQQTNq0x
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1