General
-
Target
f234c78cf1aba13f9bd1683b73682fd8_JaffaCakes118
-
Size
456KB
-
Sample
240922-rxx4asthlc
-
MD5
f234c78cf1aba13f9bd1683b73682fd8
-
SHA1
7c1550ccc98555873c2aae2696537dd2224f6db9
-
SHA256
5111cf3de2a338d87876ef8a3dd21f023e959667bc46ccfd893a882d7f2e3395
-
SHA512
83c6d959eea99d633c340f7ef9e5afe5298156b1f583b635002d238bab7c754084472f60018a1d062725d7e961d706af3eac8ff1bea88b9a9aa44137a15d814d
-
SSDEEP
6144:UFjf6UxdH4gYp98vDkT9c7vjeJ3Tck39js4c8PlEgLzkiEtsZeGGGGGGAGGGGGGd:Ujxl4gy8vDkJcXcj39jd22IPuZd
Static task
static1
Behavioral task
behavioral1
Sample
f234c78cf1aba13f9bd1683b73682fd8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f234c78cf1aba13f9bd1683b73682fd8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://51.195.53.221/p.php/TABGAUKhpT2hu
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
f234c78cf1aba13f9bd1683b73682fd8_JaffaCakes118
-
Size
456KB
-
MD5
f234c78cf1aba13f9bd1683b73682fd8
-
SHA1
7c1550ccc98555873c2aae2696537dd2224f6db9
-
SHA256
5111cf3de2a338d87876ef8a3dd21f023e959667bc46ccfd893a882d7f2e3395
-
SHA512
83c6d959eea99d633c340f7ef9e5afe5298156b1f583b635002d238bab7c754084472f60018a1d062725d7e961d706af3eac8ff1bea88b9a9aa44137a15d814d
-
SSDEEP
6144:UFjf6UxdH4gYp98vDkT9c7vjeJ3Tck39js4c8PlEgLzkiEtsZeGGGGGGAGGGGGGd:Ujxl4gy8vDkJcXcj39jd22IPuZd
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-