General
-
Target
d54cca1966108531c2ebfd137e0b1f97_JaffaCakes118
-
Size
2.4MB
-
Sample
240908-3m641atdnf
-
MD5
d54cca1966108531c2ebfd137e0b1f97
-
SHA1
46c1be1d5c1a29481933eab96c427262781ea2aa
-
SHA256
0ae6198882e9cce9a52b7b86266b53d69bcbbbe394ecec2a5674f727bddbf30b
-
SHA512
c42a62b44e62df736bfc5b218ee9c3d2b886b94ce8a933c4f933e38f03ff8af1ebff04fe0e4142695b14eb8c7b09d9cec7eb613428db25df62a0b526674336d3
-
SSDEEP
49152:UDyVJmzCDq35LO3mIp07KtjgRk0oqRuwSCFVPB9ZhhqDF8xLt9QQfBcWqeR+jlV8:yeLW8OftZQ1a7
Static task
static1
Behavioral task
behavioral1
Sample
d54cca1966108531c2ebfd137e0b1f97_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d54cca1966108531c2ebfd137e0b1f97_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://cnyedo.cf/kill/five//fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d54cca1966108531c2ebfd137e0b1f97_JaffaCakes118
-
Size
2.4MB
-
MD5
d54cca1966108531c2ebfd137e0b1f97
-
SHA1
46c1be1d5c1a29481933eab96c427262781ea2aa
-
SHA256
0ae6198882e9cce9a52b7b86266b53d69bcbbbe394ecec2a5674f727bddbf30b
-
SHA512
c42a62b44e62df736bfc5b218ee9c3d2b886b94ce8a933c4f933e38f03ff8af1ebff04fe0e4142695b14eb8c7b09d9cec7eb613428db25df62a0b526674336d3
-
SSDEEP
49152:UDyVJmzCDq35LO3mIp07KtjgRk0oqRuwSCFVPB9ZhhqDF8xLt9QQfBcWqeR+jlV8:yeLW8OftZQ1a7
-
Beds Protector Packer
Detects Beds Protector packer used to load .NET malware.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-