General
-
Target
e6681861bd070231aeb0a739e821e7c4_JaffaCakes118
-
Size
803KB
-
Sample
240917-j62h3sshnc
-
MD5
e6681861bd070231aeb0a739e821e7c4
-
SHA1
99ee12bc70b3d123bd2fdbb4b0b0f42f01fe678e
-
SHA256
af32eccfa67cab29e2766a587fe7139aa89e76d012b37ef074aa1c4cd086141f
-
SHA512
dad693de4634eb8fd1a2100ba8062cbaa8be4557686f6312aaaf42e424cfad8feec8791e0b9b00faa5f74161e7f3fa9778f6b038ffc65052ab4a5ec7fbc1e830
-
SSDEEP
12288:eb6mCM9sXHh9BoRPqsxOVKuS5r70xwgeqh043L97/hOCR0N17lz:veSHhYRRxOVGcxJBdb1knp
Static task
static1
Behavioral task
behavioral1
Sample
e6681861bd070231aeb0a739e821e7c4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e6681861bd070231aeb0a739e821e7c4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
https://tkanilux.com.ua/wells0/wrgo/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
e6681861bd070231aeb0a739e821e7c4_JaffaCakes118
-
Size
803KB
-
MD5
e6681861bd070231aeb0a739e821e7c4
-
SHA1
99ee12bc70b3d123bd2fdbb4b0b0f42f01fe678e
-
SHA256
af32eccfa67cab29e2766a587fe7139aa89e76d012b37ef074aa1c4cd086141f
-
SHA512
dad693de4634eb8fd1a2100ba8062cbaa8be4557686f6312aaaf42e424cfad8feec8791e0b9b00faa5f74161e7f3fa9778f6b038ffc65052ab4a5ec7fbc1e830
-
SSDEEP
12288:eb6mCM9sXHh9BoRPqsxOVKuS5r70xwgeqh043L97/hOCR0N17lz:veSHhYRRxOVGcxJBdb1knp
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-