General
-
Target
d164e15381cd47f2f3e58a1ac710dba6_JaffaCakes118
-
Size
803KB
-
Sample
240907-jbnczasbpm
-
MD5
d164e15381cd47f2f3e58a1ac710dba6
-
SHA1
efa2f41bc49fdb32e91f546d001f5df91ced8046
-
SHA256
1a9ccfcf04de42d54702f36240ce9248f53e8dc28f61bf5354c27c597cd789e9
-
SHA512
5ddd3af26ccb49fcc6fba5d3005010a138ed730b6438fa016cc8b01ed97fbebf844f8adbb65f6e648e931f33988ef9570206e6c80a57cd274cce09facc5fe0ef
-
SSDEEP
12288:Gb6mCM9sXHh9BoRPqsxOVKuS5r70xwgeqh043L97/hOoXs9Q/h9U3:3eSHhYRRxOVGcxJBdb1Goy
Static task
static1
Behavioral task
behavioral1
Sample
d164e15381cd47f2f3e58a1ac710dba6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d164e15381cd47f2f3e58a1ac710dba6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://tkanilux.com.ua/z0/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d164e15381cd47f2f3e58a1ac710dba6_JaffaCakes118
-
Size
803KB
-
MD5
d164e15381cd47f2f3e58a1ac710dba6
-
SHA1
efa2f41bc49fdb32e91f546d001f5df91ced8046
-
SHA256
1a9ccfcf04de42d54702f36240ce9248f53e8dc28f61bf5354c27c597cd789e9
-
SHA512
5ddd3af26ccb49fcc6fba5d3005010a138ed730b6438fa016cc8b01ed97fbebf844f8adbb65f6e648e931f33988ef9570206e6c80a57cd274cce09facc5fe0ef
-
SSDEEP
12288:Gb6mCM9sXHh9BoRPqsxOVKuS5r70xwgeqh043L97/hOoXs9Q/h9U3:3eSHhYRRxOVGcxJBdb1Goy
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-