General
-
Target
efa42fd9b1a578802b846a5ac33729e4_JaffaCakes118
-
Size
191KB
-
Sample
240921-m1qq6syerr
-
MD5
efa42fd9b1a578802b846a5ac33729e4
-
SHA1
2b55bf6507b01a11b5c05c3de7e280f2912509e1
-
SHA256
6bfd90ff3ee65b05e54934c553999e6c51fc3d8e164e5277083b82a9275fced0
-
SHA512
1ff91799d62d41ccc435e843b9e8b26b8e435706f8ab20f54797bf283df04b264138ab6ccc584753c89843b622396725accafb5b51040bf12cc61b2c1222d5f5
-
SSDEEP
3072:QBeMCVy40hsbOeOyuFDPBK2IGn8UJRSiTngJmsvUdzfEPudPA8+btMc7jpUoOtzs:bMwhwyAw92UungJ9wWnxbtR7FUoiuAjI
Static task
static1
Behavioral task
behavioral1
Sample
efa42fd9b1a578802b846a5ac33729e4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
efa42fd9b1a578802b846a5ac33729e4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
https://adimma.xyz/egom/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
efa42fd9b1a578802b846a5ac33729e4_JaffaCakes118
-
Size
191KB
-
MD5
efa42fd9b1a578802b846a5ac33729e4
-
SHA1
2b55bf6507b01a11b5c05c3de7e280f2912509e1
-
SHA256
6bfd90ff3ee65b05e54934c553999e6c51fc3d8e164e5277083b82a9275fced0
-
SHA512
1ff91799d62d41ccc435e843b9e8b26b8e435706f8ab20f54797bf283df04b264138ab6ccc584753c89843b622396725accafb5b51040bf12cc61b2c1222d5f5
-
SSDEEP
3072:QBeMCVy40hsbOeOyuFDPBK2IGn8UJRSiTngJmsvUdzfEPudPA8+btMc7jpUoOtzs:bMwhwyAw92UungJ9wWnxbtR7FUoiuAjI
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-