General
-
Target
487bcace9d16acb36dc5aa12e55e33c0_JaffaCakes118
-
Size
845KB
-
Sample
240515-25myeagh3x
-
MD5
487bcace9d16acb36dc5aa12e55e33c0
-
SHA1
ba96656d047644650069fd48705ad29842842df0
-
SHA256
54bce9cf5fd3db8c05d14145ea5828a6f03ab64b6cece66b16ca133459c204c5
-
SHA512
387680843ca96eff819618d52f7cd9d8bf1e9972b6b5f1aa731d3eda6543e68f0032f229c2a78de989b90d5437a094d6c47ba8b0349fdc7ab2744edbcf1b5bd9
-
SSDEEP
12288:P8Mu7Mo5dsAgikf4CoxPrj+esTCmDXrikd63itFtpunDIr:P8NMfAlNPrK2mHiZ3YFt4Ur
Static task
static1
Behavioral task
behavioral1
Sample
487bcace9d16acb36dc5aa12e55e33c0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
487bcace9d16acb36dc5aa12e55e33c0_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
lokibot
http://zedekus.com.ng/badmood/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
487bcace9d16acb36dc5aa12e55e33c0_JaffaCakes118
-
Size
845KB
-
MD5
487bcace9d16acb36dc5aa12e55e33c0
-
SHA1
ba96656d047644650069fd48705ad29842842df0
-
SHA256
54bce9cf5fd3db8c05d14145ea5828a6f03ab64b6cece66b16ca133459c204c5
-
SHA512
387680843ca96eff819618d52f7cd9d8bf1e9972b6b5f1aa731d3eda6543e68f0032f229c2a78de989b90d5437a094d6c47ba8b0349fdc7ab2744edbcf1b5bd9
-
SSDEEP
12288:P8Mu7Mo5dsAgikf4CoxPrj+esTCmDXrikd63itFtpunDIr:P8NMfAlNPrK2mHiZ3YFt4Ur
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-