General
-
Target
210da055070c2b04b4555752e8e1651b_JaffaCakes118
-
Size
704KB
-
Sample
241008-mhc3cssfqr
-
MD5
210da055070c2b04b4555752e8e1651b
-
SHA1
fae84c44f55fc07f7184927cc603eb4c787b5c61
-
SHA256
8679bc0899fa881c2df5ee13a0a97fbdb14712ba9599c9d9bfcf8444f68312c8
-
SHA512
8000f5fb663e1e7cb09e823748aa57b13c529de03efe4d3df9a61cb0b23fe54d164b3ea680ce8f67964bb513c42a333e115e45fe9033c11b1739043db5f08177
-
SSDEEP
12288:9EcB7rgUSPwodwuLE1mdOd7A2YBianCsGCp9dKgAYkx:9EGrbSYeLqmdOd7A2YBianCsGCpLAYkx
Static task
static1
Behavioral task
behavioral1
Sample
210da055070c2b04b4555752e8e1651b_JaffaCakes118.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
210da055070c2b04b4555752e8e1651b_JaffaCakes118.msi
Resource
win10v2004-20241007-en
Malware Config
Extracted
lokibot
http://dymanite.ca/ome/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
210da055070c2b04b4555752e8e1651b_JaffaCakes118
-
Size
704KB
-
MD5
210da055070c2b04b4555752e8e1651b
-
SHA1
fae84c44f55fc07f7184927cc603eb4c787b5c61
-
SHA256
8679bc0899fa881c2df5ee13a0a97fbdb14712ba9599c9d9bfcf8444f68312c8
-
SHA512
8000f5fb663e1e7cb09e823748aa57b13c529de03efe4d3df9a61cb0b23fe54d164b3ea680ce8f67964bb513c42a333e115e45fe9033c11b1739043db5f08177
-
SSDEEP
12288:9EcB7rgUSPwodwuLE1mdOd7A2YBianCsGCp9dKgAYkx:9EGrbSYeLqmdOd7A2YBianCsGCpLAYkx
-
Accesses Microsoft Outlook profiles
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1