General
-
Target
d6b2096db2eb22ab929b576ae402c83e_JaffaCakes118
-
Size
381KB
-
Sample
240909-ty2h8ayamk
-
MD5
d6b2096db2eb22ab929b576ae402c83e
-
SHA1
4fb837fb092367b9f2a64ac8f5268e594eb18683
-
SHA256
3c0be29b239ac47fd813a15d7b03da24ef94028da46a6efa3573f2d5b4d06f19
-
SHA512
cf9b1428ed7f21956d677ad56260ab3ea0875702b8f8d327a755a4099985df8d57fe0984a5db4c34fa859965d08ec34c474aa6f22d53df596707fcf8e0b75844
-
SSDEEP
6144:BNBvO2xkG3q0EP2oTsWOPK8DfOEiITFmr+/ZS5TPhPJfQVYtoMsOWpoku71/FkWC:LBtxkG3nEP25isfOEia8r+/ZS5TPhPJC
Static task
static1
Behavioral task
behavioral1
Sample
d6b2096db2eb22ab929b576ae402c83e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6b2096db2eb22ab929b576ae402c83e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://mountainviewproductions.ca/system/expressionengine/simbi/simbi/admin/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d6b2096db2eb22ab929b576ae402c83e_JaffaCakes118
-
Size
381KB
-
MD5
d6b2096db2eb22ab929b576ae402c83e
-
SHA1
4fb837fb092367b9f2a64ac8f5268e594eb18683
-
SHA256
3c0be29b239ac47fd813a15d7b03da24ef94028da46a6efa3573f2d5b4d06f19
-
SHA512
cf9b1428ed7f21956d677ad56260ab3ea0875702b8f8d327a755a4099985df8d57fe0984a5db4c34fa859965d08ec34c474aa6f22d53df596707fcf8e0b75844
-
SSDEEP
6144:BNBvO2xkG3q0EP2oTsWOPK8DfOEiITFmr+/ZS5TPhPJfQVYtoMsOWpoku71/FkWC:LBtxkG3nEP25isfOEia8r+/ZS5TPhPJC
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-