General
-
Target
d58b55c8069135398b11e1e99713027f_JaffaCakes118
-
Size
657KB
-
Sample
240909-ddw51ayalm
-
MD5
d58b55c8069135398b11e1e99713027f
-
SHA1
71bbbe72fb1844dcb274681557356130073df806
-
SHA256
72f90bb830d4070d56a0cf97046e38c897ee8b959f9d4a00640f2ab00b98345d
-
SHA512
5b46fb7f3aee7b0099b4830110a94b4a0d59810204c344e313ad3b5d6fa76ee9379fc6aa7586d858d7591184dd4efd27c13dd96a53fdcabb47642995336daffe
-
SSDEEP
6144:mcAIR/NXHWRX2BhvbBIsUftp+MLPQr1LrFmnglxlSOKmuf1lnVdkMBub2nUb/NrW:UCbfUpFLPWRrFUgl/KPgb4LX
Static task
static1
Behavioral task
behavioral1
Sample
d58b55c8069135398b11e1e99713027f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d58b55c8069135398b11e1e99713027f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://hmarybndays.com/bouf/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d58b55c8069135398b11e1e99713027f_JaffaCakes118
-
Size
657KB
-
MD5
d58b55c8069135398b11e1e99713027f
-
SHA1
71bbbe72fb1844dcb274681557356130073df806
-
SHA256
72f90bb830d4070d56a0cf97046e38c897ee8b959f9d4a00640f2ab00b98345d
-
SHA512
5b46fb7f3aee7b0099b4830110a94b4a0d59810204c344e313ad3b5d6fa76ee9379fc6aa7586d858d7591184dd4efd27c13dd96a53fdcabb47642995336daffe
-
SSDEEP
6144:mcAIR/NXHWRX2BhvbBIsUftp+MLPQr1LrFmnglxlSOKmuf1lnVdkMBub2nUb/NrW:UCbfUpFLPWRrFUgl/KPgb4LX
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-