General
-
Target
2bb8eff795e74ff189c0bbd6bd01e439_JaffaCakes118
-
Size
622KB
-
Sample
240509-z1nb9saa89
-
MD5
2bb8eff795e74ff189c0bbd6bd01e439
-
SHA1
89b98ef34938a05d29a36eba1b3684c226cc3a8e
-
SHA256
6290631ed5047788ee684455fa4602b05f806a329cdbc758d0655d00d54e8189
-
SHA512
c18def0547436e274e0427850721db8dbe7ad6646cda0f0b899caee3a49b288f012dc43a4e74dcf2b16e93a5c851dfc44d5bf593b28926abc3522140d0bb84a8
-
SSDEEP
6144:0yHoLoI0KiEPpoQdLuNCaxPiHoftdCo1TJNdXh3JsAKdAfKx/8GcsMBvMCmJp1:0eoLoI0OjokIfO4Jl5KdA+esTCmJ
Static task
static1
Behavioral task
behavioral1
Sample
2bb8eff795e74ff189c0bbd6bd01e439_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2bb8eff795e74ff189c0bbd6bd01e439_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://rockingworld.gq/paris/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
2bb8eff795e74ff189c0bbd6bd01e439_JaffaCakes118
-
Size
622KB
-
MD5
2bb8eff795e74ff189c0bbd6bd01e439
-
SHA1
89b98ef34938a05d29a36eba1b3684c226cc3a8e
-
SHA256
6290631ed5047788ee684455fa4602b05f806a329cdbc758d0655d00d54e8189
-
SHA512
c18def0547436e274e0427850721db8dbe7ad6646cda0f0b899caee3a49b288f012dc43a4e74dcf2b16e93a5c851dfc44d5bf593b28926abc3522140d0bb84a8
-
SSDEEP
6144:0yHoLoI0KiEPpoQdLuNCaxPiHoftdCo1TJNdXh3JsAKdAfKx/8GcsMBvMCmJp1:0eoLoI0OjokIfO4Jl5KdA+esTCmJ
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-