General
-
Target
50429b6cb4ef0a6d29f292caa54f7295JaffaCakes118.bin
-
Size
536KB
-
Sample
240517-3bkfvsgd2y
-
MD5
50429b6cb4ef0a6d29f292caa54f7295
-
SHA1
79a852f98f6b4e2ea1ef9353c77c18b1017355e8
-
SHA256
cbc35ecabbdbca204a8e095a878ead95ff71842493ec8365865c421b38861ee6
-
SHA512
2ccd788406d1c4ad56cee9d0386fedf6836273c908eae1fb23dcd6230413c7dfaa194d3fbbbb3c76343b13f2a8b64998e8a3aaa79f525f03789b78ecba1e05f6
-
SSDEEP
12288:8vpSsqzU5Ht1OSkVC8/QwQZkKIEamTJbiszTIX7yQO0B:8vosqg9t0SzSckKPNisXImQVB
Static task
static1
Behavioral task
behavioral1
Sample
50429b6cb4ef0a6d29f292caa54f7295JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
50429b6cb4ef0a6d29f292caa54f7295JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
lokibot
http://sylvaclouds.eu/kendrick/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
50429b6cb4ef0a6d29f292caa54f7295JaffaCakes118.bin
-
Size
536KB
-
MD5
50429b6cb4ef0a6d29f292caa54f7295
-
SHA1
79a852f98f6b4e2ea1ef9353c77c18b1017355e8
-
SHA256
cbc35ecabbdbca204a8e095a878ead95ff71842493ec8365865c421b38861ee6
-
SHA512
2ccd788406d1c4ad56cee9d0386fedf6836273c908eae1fb23dcd6230413c7dfaa194d3fbbbb3c76343b13f2a8b64998e8a3aaa79f525f03789b78ecba1e05f6
-
SSDEEP
12288:8vpSsqzU5Ht1OSkVC8/QwQZkKIEamTJbiszTIX7yQO0B:8vosqg9t0SzSckKPNisXImQVB
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-