General
-
Target
d3addeeb728e0d35f8ec1a098f33ce9b_JaffaCakes118
-
Size
523KB
-
Sample
240908-gf2p2ssbld
-
MD5
d3addeeb728e0d35f8ec1a098f33ce9b
-
SHA1
2a4aa052b8525bf5f9f05cc965ba138f3af8673b
-
SHA256
35aa9e89dc0cea97ecfba933daf338567a7c00a50cfe18cfd4a85c2870164351
-
SHA512
567c95a43bf3029262b66187d760008c6d9d8fbb54814e5f0c1880a6330e68230221e296d2ea2381ede915bad9ea0fd329e90923e0ebe08642996b3d5bdac38b
-
SSDEEP
6144:uCdK6Srtxx81k3hFB1sx+nQN0wYMEoMeQCjFRHIeNbeCp+jYdUYmt3LQpzd5BuV1:stxx8GVssOEoMaFRHIeN6YeF70MVeA
Behavioral task
behavioral1
Sample
d3addeeb728e0d35f8ec1a098f33ce9b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d3addeeb728e0d35f8ec1a098f33ce9b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://178.156.202.117/lewy/lewy/sun/quakes/solar/gem/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d3addeeb728e0d35f8ec1a098f33ce9b_JaffaCakes118
-
Size
523KB
-
MD5
d3addeeb728e0d35f8ec1a098f33ce9b
-
SHA1
2a4aa052b8525bf5f9f05cc965ba138f3af8673b
-
SHA256
35aa9e89dc0cea97ecfba933daf338567a7c00a50cfe18cfd4a85c2870164351
-
SHA512
567c95a43bf3029262b66187d760008c6d9d8fbb54814e5f0c1880a6330e68230221e296d2ea2381ede915bad9ea0fd329e90923e0ebe08642996b3d5bdac38b
-
SSDEEP
6144:uCdK6Srtxx81k3hFB1sx+nQN0wYMEoMeQCjFRHIeNbeCp+jYdUYmt3LQpzd5BuV1:stxx8GVssOEoMaFRHIeN6YeF70MVeA
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-