General
-
Target
fea47f49a11523967618642b6f20c64d_JaffaCakes118
-
Size
242KB
-
Sample
240929-qxwd2awflr
-
MD5
fea47f49a11523967618642b6f20c64d
-
SHA1
c8b39222a274184fec9468efbb4f4e25aa2ecdfd
-
SHA256
9a5e10986c93f2ad50780938f9ccd96514a3584939d77bae42c3c6450cf5206a
-
SHA512
f2ad433b2ad1151bd2ef1114dd9efe30ff36a97a90f4a1c84f2a6b5a5fc289c42cf98ea89c50ec64da2ea744705a00eef82a70635dc98a50ad4187f1b747e378
-
SSDEEP
6144:ZkmlaGfG6KlWhdOopZ0HR69O27i6W/WcFiGFAOzbd:xlabC0oogTikGGOz
Static task
static1
Behavioral task
behavioral1
Sample
fea47f49a11523967618642b6f20c64d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fea47f49a11523967618642b6f20c64d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://192.189.25.121/meown/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
fea47f49a11523967618642b6f20c64d_JaffaCakes118
-
Size
242KB
-
MD5
fea47f49a11523967618642b6f20c64d
-
SHA1
c8b39222a274184fec9468efbb4f4e25aa2ecdfd
-
SHA256
9a5e10986c93f2ad50780938f9ccd96514a3584939d77bae42c3c6450cf5206a
-
SHA512
f2ad433b2ad1151bd2ef1114dd9efe30ff36a97a90f4a1c84f2a6b5a5fc289c42cf98ea89c50ec64da2ea744705a00eef82a70635dc98a50ad4187f1b747e378
-
SSDEEP
6144:ZkmlaGfG6KlWhdOopZ0HR69O27i6W/WcFiGFAOzbd:xlabC0oogTikGGOz
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1