General
-
Target
71bc06523eff20bda9197d0020b751cf_JaffaCakes118
-
Size
656KB
-
Sample
241024-bxr92s1apk
-
MD5
71bc06523eff20bda9197d0020b751cf
-
SHA1
3215635a506e4c538daa7adcd1606d348d25e0b5
-
SHA256
165f271fb293701f0b6ab71033eeb9568c18aefcdd847060a3d57475eae2aeed
-
SHA512
a29e3852395e9fdfc74686b648394ae811eb4b3e14c2592273a765539d844f419a7c505868beb57a858f39f9ae296b16e97ba87562d0662e955fbc73566d6ee0
-
SSDEEP
6144:EE7TMenVqe/eD8zNa0ILko3H5M1T5DsApiRCDE6YG320A5E7cYDvhRNQ0OBjtguZ:EEXnVqKeDI/ID3HxBuGurTNr2
Static task
static1
Behavioral task
behavioral1
Sample
71bc06523eff20bda9197d0020b751cf_JaffaCakes118.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
71bc06523eff20bda9197d0020b751cf_JaffaCakes118.msi
Resource
win10v2004-20241007-en
Malware Config
Extracted
lokibot
http://spimagesinc.com/images/ImgDump_04-25-16/picture/gallery/newfoldwer/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
71bc06523eff20bda9197d0020b751cf_JaffaCakes118
-
Size
656KB
-
MD5
71bc06523eff20bda9197d0020b751cf
-
SHA1
3215635a506e4c538daa7adcd1606d348d25e0b5
-
SHA256
165f271fb293701f0b6ab71033eeb9568c18aefcdd847060a3d57475eae2aeed
-
SHA512
a29e3852395e9fdfc74686b648394ae811eb4b3e14c2592273a765539d844f419a7c505868beb57a858f39f9ae296b16e97ba87562d0662e955fbc73566d6ee0
-
SSDEEP
6144:EE7TMenVqe/eD8zNa0ILko3H5M1T5DsApiRCDE6YG320A5E7cYDvhRNQ0OBjtguZ:EEXnVqKeDI/ID3HxBuGurTNr2
-
Accesses Microsoft Outlook profiles
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1