General
-
Target
e4f54ba74923ff41d918ae105b31f510_JaffaCakes118
-
Size
917KB
-
Sample
240916-rp4wwasbrf
-
MD5
e4f54ba74923ff41d918ae105b31f510
-
SHA1
41a457edb3669b7949ad232c104d3e505977a37f
-
SHA256
d8560620db27262f8af525a87487f355a7dd8569ceea2a5ebb0edbee8d7fec2d
-
SHA512
c598eaf544515a7606c3bb1554c306308009dd88ec207efce83163b12bf432ac0204aed34bed9f0cae2e1ccf252438fca920e843bda8b584751bf7acdc5692f5
-
SSDEEP
12288:vYV6MorX7qzuC3QHO9FQVHPF51jgc7mJnLM6VjNGQ41TyMIVqTzU8:8BXu9HGaVH7MnLdpNkOnVqn/
Behavioral task
behavioral1
Sample
e4f54ba74923ff41d918ae105b31f510_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e4f54ba74923ff41d918ae105b31f510_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://rowanyne.co/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
e4f54ba74923ff41d918ae105b31f510_JaffaCakes118
-
Size
917KB
-
MD5
e4f54ba74923ff41d918ae105b31f510
-
SHA1
41a457edb3669b7949ad232c104d3e505977a37f
-
SHA256
d8560620db27262f8af525a87487f355a7dd8569ceea2a5ebb0edbee8d7fec2d
-
SHA512
c598eaf544515a7606c3bb1554c306308009dd88ec207efce83163b12bf432ac0204aed34bed9f0cae2e1ccf252438fca920e843bda8b584751bf7acdc5692f5
-
SSDEEP
12288:vYV6MorX7qzuC3QHO9FQVHPF51jgc7mJnLM6VjNGQ41TyMIVqTzU8:8BXu9HGaVH7MnLdpNkOnVqn/
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-