General
-
Target
d3274502944236292d9c486a333f411b_JaffaCakes118
-
Size
529KB
-
Sample
240908-axk1astgrl
-
MD5
d3274502944236292d9c486a333f411b
-
SHA1
77f7227826685a63e2eddcb008e6dcf19035f8cd
-
SHA256
29d773d15761c4d54edabdb7f5f165d8a111c001da73e412e4313140e13aba63
-
SHA512
8c797c613c437cbb2d7a3c995749dc6a929bedbd3cc6996a4034703f547a42fcb9c7bac5fadb8852f4d26fe184964128d115cc4ffec489d97d73d4725108c4ea
-
SSDEEP
6144:AgmXLE8laSrBvqUZ2YmLwE7yZZdyUYu1I9GlXOB8Lb6dscLV735Zg8ionw:oXtB1I9GlVLb2R3Hg8
Static task
static1
Behavioral task
behavioral1
Sample
d3274502944236292d9c486a333f411b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3274502944236292d9c486a333f411b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://gulfclouds.site/jeff/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d3274502944236292d9c486a333f411b_JaffaCakes118
-
Size
529KB
-
MD5
d3274502944236292d9c486a333f411b
-
SHA1
77f7227826685a63e2eddcb008e6dcf19035f8cd
-
SHA256
29d773d15761c4d54edabdb7f5f165d8a111c001da73e412e4313140e13aba63
-
SHA512
8c797c613c437cbb2d7a3c995749dc6a929bedbd3cc6996a4034703f547a42fcb9c7bac5fadb8852f4d26fe184964128d115cc4ffec489d97d73d4725108c4ea
-
SSDEEP
6144:AgmXLE8laSrBvqUZ2YmLwE7yZZdyUYu1I9GlXOB8Lb6dscLV735Zg8ionw:oXtB1I9GlVLb2R3Hg8
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-