General
-
Target
d6d930833f8f2ede9362a09329e7f4ac_JaffaCakes118
-
Size
465KB
-
Sample
240909-wsgmzasbkl
-
MD5
d6d930833f8f2ede9362a09329e7f4ac
-
SHA1
38984a2cd22557db3ee44b29a9d7100fffa5ce39
-
SHA256
7159c94e767e0c5e2bdbcd02f04bffd4226f174dc46755995cd7679c289f6cae
-
SHA512
632d51bb1112e7518a186321535908a7da6cd42540dbf2fd10c73f32b6e2a75a26dd68b6829d27608758ee63d3b788bc4ae8128842ae59cb1b6ab47eb8a93e7a
-
SSDEEP
12288:zZUvcU//JjlmM6WSFXJlirXraVnOkul3MvXq1BR:z5aJ8M6TLSXu0kuZMvXQR
Static task
static1
Behavioral task
behavioral1
Sample
d6d930833f8f2ede9362a09329e7f4ac_JaffaCakes118.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6d930833f8f2ede9362a09329e7f4ac_JaffaCakes118.ps1
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://webxpo.ga/luky/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d6d930833f8f2ede9362a09329e7f4ac_JaffaCakes118
-
Size
465KB
-
MD5
d6d930833f8f2ede9362a09329e7f4ac
-
SHA1
38984a2cd22557db3ee44b29a9d7100fffa5ce39
-
SHA256
7159c94e767e0c5e2bdbcd02f04bffd4226f174dc46755995cd7679c289f6cae
-
SHA512
632d51bb1112e7518a186321535908a7da6cd42540dbf2fd10c73f32b6e2a75a26dd68b6829d27608758ee63d3b788bc4ae8128842ae59cb1b6ab47eb8a93e7a
-
SSDEEP
12288:zZUvcU//JjlmM6WSFXJlirXraVnOkul3MvXq1BR:z5aJ8M6TLSXu0kuZMvXQR
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1