General
-
Target
0028c6663d76397568c1ef019a1bf23f_JaffaCakes118
-
Size
300KB
-
Sample
240425-1tg3caff74
-
MD5
0028c6663d76397568c1ef019a1bf23f
-
SHA1
12945f74968c2fb94c0f2effa2fd8290fa09bf55
-
SHA256
290112be54465015af39de5d801710c518fe5f8a5fb1c18d06a104517c9332e3
-
SHA512
5514b7f8c33179f5b590f6f0745ae896cdcfa9089399e1b189c72c0e1d168eeaf5a6c251f70b1b75e4e913d34f83d0fd5dc54914118863a4a34be115aa2bfdb6
-
SSDEEP
3072:Bv2tkLxYFLlYEwYqMWkLwW4aij8m5l3bP3pZgES:Bv2mqTwkfi95l3rpZm
Static task
static1
Behavioral task
behavioral1
Sample
0028c6663d76397568c1ef019a1bf23f_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0028c6663d76397568c1ef019a1bf23f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
lokibot
https://flypadi.com/images/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
0028c6663d76397568c1ef019a1bf23f_JaffaCakes118
-
Size
300KB
-
MD5
0028c6663d76397568c1ef019a1bf23f
-
SHA1
12945f74968c2fb94c0f2effa2fd8290fa09bf55
-
SHA256
290112be54465015af39de5d801710c518fe5f8a5fb1c18d06a104517c9332e3
-
SHA512
5514b7f8c33179f5b590f6f0745ae896cdcfa9089399e1b189c72c0e1d168eeaf5a6c251f70b1b75e4e913d34f83d0fd5dc54914118863a4a34be115aa2bfdb6
-
SSDEEP
3072:Bv2tkLxYFLlYEwYqMWkLwW4aij8m5l3bP3pZgES:Bv2mqTwkfi95l3rpZm
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-