General
-
Target
6913d027ae8600244f3f1c6f3ab59afe_JaffaCakes118
-
Size
632KB
-
Sample
241022-fzmvkazbla
-
MD5
6913d027ae8600244f3f1c6f3ab59afe
-
SHA1
93558a00ff3b7c2d4e00e0c7069cf429493b9d64
-
SHA256
8b033bc4ebf5b32f9a4a03e3d743fbc781af36552ebf14e4d0aa9e4e50759880
-
SHA512
96da537708d3af54a91a7ecb6e78db9c0bbbd81997d1c4de2e2af3ec97ba8a43baacddf1d1f82595b8addf195f12985f75c1d51b2fe609ee29c87cc20ef7ad41
-
SSDEEP
12288:OD4VHfQe6ZyWshg+qbZxTZZWunAWvkAvQdBq10af3NAZu9rTDRdWSYTEu3NAUke7:OD4VHfQe6ZyWshg+qbZxTZZWunAWvtvr
Static task
static1
Behavioral task
behavioral1
Sample
6913d027ae8600244f3f1c6f3ab59afe_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
lokibot
http://136.243.159.53/~element/page.php?id=466
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
6913d027ae8600244f3f1c6f3ab59afe_JaffaCakes118
-
Size
632KB
-
MD5
6913d027ae8600244f3f1c6f3ab59afe
-
SHA1
93558a00ff3b7c2d4e00e0c7069cf429493b9d64
-
SHA256
8b033bc4ebf5b32f9a4a03e3d743fbc781af36552ebf14e4d0aa9e4e50759880
-
SHA512
96da537708d3af54a91a7ecb6e78db9c0bbbd81997d1c4de2e2af3ec97ba8a43baacddf1d1f82595b8addf195f12985f75c1d51b2fe609ee29c87cc20ef7ad41
-
SSDEEP
12288:OD4VHfQe6ZyWshg+qbZxTZZWunAWvkAvQdBq10af3NAZu9rTDRdWSYTEu3NAUke7:OD4VHfQe6ZyWshg+qbZxTZZWunAWvtvr
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses Microsoft Outlook profiles
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1