General
-
Target
ce6f92047d9c382e7ee7e4ec9c8a1ec6_JaffaCakes118
-
Size
978KB
-
Sample
240906-cx3lfs1gnf
-
MD5
ce6f92047d9c382e7ee7e4ec9c8a1ec6
-
SHA1
7d696fc777cade7257c77381fa8e6b874ed8e7d8
-
SHA256
504d0c278e73e891d33ca54f860b323f003d120284be3779975e9dedc3c5a132
-
SHA512
095433e2a75cae3d0c505ec86984d115c37631291d9310a3d15266210fa8e8865e07db70b88bee0ebf39bde4d6f1e0a501b917d4f8adcf307f951587c69b911c
-
SSDEEP
24576:z4lavt0LkLL9IMixoEgea3h6u1ckteyq9MmCS:Gkwkn9IMHea3h68r9aPCS
Static task
static1
Behavioral task
behavioral1
Sample
ce6f92047d9c382e7ee7e4ec9c8a1ec6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce6f92047d9c382e7ee7e4ec9c8a1ec6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://zjxhqd.com/apart/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
ce6f92047d9c382e7ee7e4ec9c8a1ec6_JaffaCakes118
-
Size
978KB
-
MD5
ce6f92047d9c382e7ee7e4ec9c8a1ec6
-
SHA1
7d696fc777cade7257c77381fa8e6b874ed8e7d8
-
SHA256
504d0c278e73e891d33ca54f860b323f003d120284be3779975e9dedc3c5a132
-
SHA512
095433e2a75cae3d0c505ec86984d115c37631291d9310a3d15266210fa8e8865e07db70b88bee0ebf39bde4d6f1e0a501b917d4f8adcf307f951587c69b911c
-
SSDEEP
24576:z4lavt0LkLL9IMixoEgea3h6u1ckteyq9MmCS:Gkwkn9IMHea3h68r9aPCS
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-