General
-
Target
d1312b65ba8ce2d74ddfc859555105e5JaffaCakes118
-
Size
1.0MB
-
Sample
240907-pxqywawanj
-
MD5
d1312b65ba8ce2d74ddfc859555105e5
-
SHA1
2dbf52ac263e3577ba57645c1b364bef97baa3a6
-
SHA256
616d536551a36dc7de21ef1945fba7edf919d6cf4bc14ddee3f983f1e55bbf74
-
SHA512
c778708463d039f48bed2f9e597c19cef1f0bcdf3aa26fb69e3d279ac62187783d4e4552071f7503bd2f18129399c09f5f316b4d46feba9ed6b719346e72be4e
-
SSDEEP
12288:c3lK8FluRs7Z8z4asvs1drdyImcHFebpvqgjoid2K046Mnq0UnsO5lJkKzUvoPUT:S9ZMRInpOdPZixK1q
Static task
static1
Behavioral task
behavioral1
Sample
d1312b65ba8ce2d74ddfc859555105e5JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d1312b65ba8ce2d74ddfc859555105e5JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://136.243.159.53/~element/page.php?id=477
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d1312b65ba8ce2d74ddfc859555105e5JaffaCakes118
-
Size
1.0MB
-
MD5
d1312b65ba8ce2d74ddfc859555105e5
-
SHA1
2dbf52ac263e3577ba57645c1b364bef97baa3a6
-
SHA256
616d536551a36dc7de21ef1945fba7edf919d6cf4bc14ddee3f983f1e55bbf74
-
SHA512
c778708463d039f48bed2f9e597c19cef1f0bcdf3aa26fb69e3d279ac62187783d4e4552071f7503bd2f18129399c09f5f316b4d46feba9ed6b719346e72be4e
-
SSDEEP
12288:c3lK8FluRs7Z8z4asvs1drdyImcHFebpvqgjoid2K046Mnq0UnsO5lJkKzUvoPUT:S9ZMRInpOdPZixK1q
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-