General
-
Target
1d4fa309108061f3c51b80f071f26f3c_JaffaCakes118
-
Size
308KB
-
Sample
240506-tmzv9acg84
-
MD5
1d4fa309108061f3c51b80f071f26f3c
-
SHA1
dca63e99f89cee44b89cefa9e7da53ee65e07f46
-
SHA256
6af1c2eaab23e63e51e0089fd6e94d5079bb5ce141b9684bda854f378f1f0977
-
SHA512
1300867cef3cb6404099450decd8335f452ecf1cf6e30c2b55954517986bb6d522f2993e31b640ac688b254f56d0135bc4c5d36bc9bc83be0dfc4f4309f483c4
-
SSDEEP
6144:6CN9BcsqVD9kJEJsxN0lGB3IOAtNu/vuVizzXI2mWYyWtMmB4tojPMenp+:6ISsqMJEJI09OCQ/mVizDI1LyWq04CP8
Static task
static1
Behavioral task
behavioral1
Sample
invoice.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
invoice.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
lokibot
http://www.institutoiav.edu.uy/panel/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
invoice.exe
-
Size
437KB
-
MD5
eaec0731e156084db154c7fe1546f5fc
-
SHA1
fdd39cf398f1992f8c369cc2cefafd63f8062400
-
SHA256
f107886143b6c729851c50f52239b45bf8b15df46db1706964ebfa336e641e0b
-
SHA512
e10d8cab25cd509b4f4d0c122d6bfe224c15e69119b441142255cb7c4b2c722ca4a990cfc004b65e2b72a58ce2a4cadb58bcbdc88d75567fa8969b554e1cb158
-
SSDEEP
6144:UdgRjqJQOj2p+llPEpktvbAtXzwhsTi538uRoqaJ5Ga7jkqVpvp:Vkrj2p+llPzvNeK8uRVaJ5Gejk
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-