General
-
Target
ec902e72e7bac0e3f3baf9bbbb07cb49_JaffaCakes118
-
Size
607KB
-
Sample
240920-brkysa1fnc
-
MD5
ec902e72e7bac0e3f3baf9bbbb07cb49
-
SHA1
e646302e2a47859ec9bc7d9fc30e935623ada185
-
SHA256
a69ddc2bba4dfe073f94bec1d1f29fb5d61ba2fa75fdfc41548ae06522531fd0
-
SHA512
49d97dc459fb750f09ad0d111840a249efd3c4b85e97652c8861fb1faf1ced117d64d8f4f28348d637b76d2ca9865ab3ee09b952ea66ead9ca67d4bbd446736a
-
SSDEEP
12288:rM7tDsMVRASPswo7e8BxMp/iTK0vyTwNU6Ktl04TwDLMLSMDv2mxD6PLUf:+VZDuvyf1fUULSMKw+PY
Static task
static1
Behavioral task
behavioral1
Sample
ec902e72e7bac0e3f3baf9bbbb07cb49_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ec902e72e7bac0e3f3baf9bbbb07cb49_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://modcloudserver.eu/petercody/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
ec902e72e7bac0e3f3baf9bbbb07cb49_JaffaCakes118
-
Size
607KB
-
MD5
ec902e72e7bac0e3f3baf9bbbb07cb49
-
SHA1
e646302e2a47859ec9bc7d9fc30e935623ada185
-
SHA256
a69ddc2bba4dfe073f94bec1d1f29fb5d61ba2fa75fdfc41548ae06522531fd0
-
SHA512
49d97dc459fb750f09ad0d111840a249efd3c4b85e97652c8861fb1faf1ced117d64d8f4f28348d637b76d2ca9865ab3ee09b952ea66ead9ca67d4bbd446736a
-
SSDEEP
12288:rM7tDsMVRASPswo7e8BxMp/iTK0vyTwNU6Ktl04TwDLMLSMDv2mxD6PLUf:+VZDuvyf1fUULSMKw+PY
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-