General
-
Target
dcc60ba2fd1a63fd23c1b46d0dc4e808_JaffaCakes118
-
Size
897KB
-
Sample
240912-wq3gnaxaqk
-
MD5
dcc60ba2fd1a63fd23c1b46d0dc4e808
-
SHA1
beabdbf1ce4ffe1f2c2957724ab8a6579b7cb34c
-
SHA256
d71df02bd84ee3f257322538a5bd3f664326f95af49322dca72bd1d0c3a59df6
-
SHA512
97e8efff1329cbd48e7bb1d23a0dea7499c55989bab7033e341e0fc392d644faa559e3279fad2c9fa2b5909bbb0c123bdb3bb66e8cf544db5970f87584eeaa3a
-
SSDEEP
768:1EZpjWcWao027WKA8P0p0GNFtlni5d3SZtP9fFncXgLqzFYp3Kr20lRD6cvjOJ3j:+WPMkFmJXkicNQJ+IW4/irtVLe+PDvFy
Static task
static1
Behavioral task
behavioral1
Sample
dcc60ba2fd1a63fd23c1b46d0dc4e808_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcc60ba2fd1a63fd23c1b46d0dc4e808_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://becharnise.ir/fa15/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
dcc60ba2fd1a63fd23c1b46d0dc4e808_JaffaCakes118
-
Size
897KB
-
MD5
dcc60ba2fd1a63fd23c1b46d0dc4e808
-
SHA1
beabdbf1ce4ffe1f2c2957724ab8a6579b7cb34c
-
SHA256
d71df02bd84ee3f257322538a5bd3f664326f95af49322dca72bd1d0c3a59df6
-
SHA512
97e8efff1329cbd48e7bb1d23a0dea7499c55989bab7033e341e0fc392d644faa559e3279fad2c9fa2b5909bbb0c123bdb3bb66e8cf544db5970f87584eeaa3a
-
SSDEEP
768:1EZpjWcWao027WKA8P0p0GNFtlni5d3SZtP9fFncXgLqzFYp3Kr20lRD6cvjOJ3j:+WPMkFmJXkicNQJ+IW4/irtVLe+PDvFy
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-