General
-
Target
23ce2105091ff8f721ff05b5adea9473_JaffaCakes118
-
Size
230KB
-
Sample
240508-h9hdyahb5s
-
MD5
23ce2105091ff8f721ff05b5adea9473
-
SHA1
3d427b0c8f7165ef5966fb0b22a6bf8768638e6b
-
SHA256
da139240b18d550c7c38051e30bb83213e06273f1267ff5ac748e59ef9790bd6
-
SHA512
1d21bea08e470dc0ad5b6b5381151f949e1c0c4bb2adcb417d59150a821e168572102367b43c423d5eed88f7f496024fb50388126150a8dc2b2ad3356ced563c
-
SSDEEP
6144:iNe6CngtmMTiaYel88voZqJmwUlNRPo0tGUcqHuPz+Ng:iNBFXTqel88v0qgwUTFbTcSuau
Static task
static1
Behavioral task
behavioral1
Sample
23ce2105091ff8f721ff05b5adea9473_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
lokibot
https://lonqtek.com/eze/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
23ce2105091ff8f721ff05b5adea9473_JaffaCakes118
-
Size
230KB
-
MD5
23ce2105091ff8f721ff05b5adea9473
-
SHA1
3d427b0c8f7165ef5966fb0b22a6bf8768638e6b
-
SHA256
da139240b18d550c7c38051e30bb83213e06273f1267ff5ac748e59ef9790bd6
-
SHA512
1d21bea08e470dc0ad5b6b5381151f949e1c0c4bb2adcb417d59150a821e168572102367b43c423d5eed88f7f496024fb50388126150a8dc2b2ad3356ced563c
-
SSDEEP
6144:iNe6CngtmMTiaYel88voZqJmwUlNRPo0tGUcqHuPz+Ng:iNBFXTqel88v0qgwUTFbTcSuau
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-