General
-
Target
000bb339dba05ea8f454258721dded35_JaffaCakes118
-
Size
679KB
-
Sample
240425-zmj3paee8w
-
MD5
000bb339dba05ea8f454258721dded35
-
SHA1
2ca26c715dd45887a5c3fd0ccf6883972ed2af94
-
SHA256
d4391a7a1eff8f02ebd49ae4a61050b825eed773d3cb5a8bdf5603daa1e77657
-
SHA512
e3076454e0ce0a2c7f5289e98110dd3a8aec3b993eb34be90ea023b855ac05fb61bc54a14e388cea75020a828b75666f091642894b6a8a0e9989453f4e9956ae
-
SSDEEP
6144:mGE+NRU+ueOwjsBjZ6ch0rWNOf1lxjO14VVAGy5O/B/ZF4:mGEkR0eO3HKS1Qi5ObF
Static task
static1
Behavioral task
behavioral1
Sample
000bb339dba05ea8f454258721dded35_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
000bb339dba05ea8f454258721dded35_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
lokibot
http://89.34.237.212/black/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
000bb339dba05ea8f454258721dded35_JaffaCakes118
-
Size
679KB
-
MD5
000bb339dba05ea8f454258721dded35
-
SHA1
2ca26c715dd45887a5c3fd0ccf6883972ed2af94
-
SHA256
d4391a7a1eff8f02ebd49ae4a61050b825eed773d3cb5a8bdf5603daa1e77657
-
SHA512
e3076454e0ce0a2c7f5289e98110dd3a8aec3b993eb34be90ea023b855ac05fb61bc54a14e388cea75020a828b75666f091642894b6a8a0e9989453f4e9956ae
-
SSDEEP
6144:mGE+NRU+ueOwjsBjZ6ch0rWNOf1lxjO14VVAGy5O/B/ZF4:mGEkR0eO3HKS1Qi5ObF
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-