General
-
Target
458174931094fea9a1b924440f0125e6_JaffaCakes118
-
Size
600KB
-
Sample
240515-lbgxasah86
-
MD5
458174931094fea9a1b924440f0125e6
-
SHA1
3f71331342f04184e4aea0cd95ed341306d570db
-
SHA256
5b25ccbadce2536b0b89cbc7db98ad273b04b8f9f6589798f1c61197977db3d6
-
SHA512
a95f4bc50636e1397fdb1b44d5a57412f5f99358a24be650baa07cf2b9c4f98e5d81228bfa86c25c07318cf858bab548785f4fc631ad4eca9616a54ec0907cc2
-
SSDEEP
12288:jWcp8wkfBN7LLf50z1S2a34Yuc0k7x0MvfbQGWTd:qcGfDxO24Yuc0Ax0MvjQ/
Behavioral task
behavioral1
Sample
458174931094fea9a1b924440f0125e6_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
458174931094fea9a1b924440f0125e6_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://abscete.info/sinzu/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
458174931094fea9a1b924440f0125e6_JaffaCakes118
-
Size
600KB
-
MD5
458174931094fea9a1b924440f0125e6
-
SHA1
3f71331342f04184e4aea0cd95ed341306d570db
-
SHA256
5b25ccbadce2536b0b89cbc7db98ad273b04b8f9f6589798f1c61197977db3d6
-
SHA512
a95f4bc50636e1397fdb1b44d5a57412f5f99358a24be650baa07cf2b9c4f98e5d81228bfa86c25c07318cf858bab548785f4fc631ad4eca9616a54ec0907cc2
-
SSDEEP
12288:jWcp8wkfBN7LLf50z1S2a34Yuc0k7x0MvfbQGWTd:qcGfDxO24Yuc0Ax0MvjQ/
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-