General
-
Target
d0ebdeaa4db8ba653d9ec57708bd20c9_JaffaCakes118
-
Size
877KB
-
Sample
240907-db8e9a1hpc
-
MD5
d0ebdeaa4db8ba653d9ec57708bd20c9
-
SHA1
6922ed899f21c8c7bc42e4abf1dfe9c6fc954034
-
SHA256
5debb1dde76910d16dd75e801a3ff1a4e7d103162165a749f590a52609ecad1f
-
SHA512
3421308906c425278c1ede1b85fdfe3641f5b85bb8282ab8c33b4b6135caf9770ae2de6c1d3bc856167d94166b8853001bcdaccbcedc62470b44ac8aa56c08af
-
SSDEEP
6144:a/FEK5qtJgd6vyZdcMO42hN1VGPOORSuzX7QoDKgk8PB79UoB/+F9cLRkqV+mC7R:UF5SwSuzOgtU4wudqOdWcBO8VGbyot
Static task
static1
Behavioral task
behavioral1
Sample
d0ebdeaa4db8ba653d9ec57708bd20c9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0ebdeaa4db8ba653d9ec57708bd20c9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://142.11.210.173/1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d0ebdeaa4db8ba653d9ec57708bd20c9_JaffaCakes118
-
Size
877KB
-
MD5
d0ebdeaa4db8ba653d9ec57708bd20c9
-
SHA1
6922ed899f21c8c7bc42e4abf1dfe9c6fc954034
-
SHA256
5debb1dde76910d16dd75e801a3ff1a4e7d103162165a749f590a52609ecad1f
-
SHA512
3421308906c425278c1ede1b85fdfe3641f5b85bb8282ab8c33b4b6135caf9770ae2de6c1d3bc856167d94166b8853001bcdaccbcedc62470b44ac8aa56c08af
-
SSDEEP
6144:a/FEK5qtJgd6vyZdcMO42hN1VGPOORSuzX7QoDKgk8PB79UoB/+F9cLRkqV+mC7R:UF5SwSuzOgtU4wudqOdWcBO8VGbyot
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-