General
-
Target
5b1e0fabacf35f807e19710def7ba243_JaffaCakes118
-
Size
577KB
-
Sample
240519-yd8t1sef3s
-
MD5
5b1e0fabacf35f807e19710def7ba243
-
SHA1
458261a57d94bb58fc02039e87605ab486ee8e07
-
SHA256
9ec481849ac6bc985263c67265b5de77102efa150fb41eb78a1128c43ebb3646
-
SHA512
d57a956a7194dd4b50546b8f8aca1b68920d8d0fa35ffdf69933a3004aeb24380685675a42f95b24332a67a418083ad33c1ab647b4941a51d6904e073dbaba21
-
SSDEEP
12288:sAwebYuH8EbIg5TYzKPSIXijcBM0ezT0DK1c1FMbA09PmPrbaHU9:7wba8EbI1mWIKiMbA0Nmzba09
Static task
static1
Behavioral task
behavioral1
Sample
5b1e0fabacf35f807e19710def7ba243_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5b1e0fabacf35f807e19710def7ba243_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
lokibot
http://shipboot.com/dev/wp-admin/images/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
5b1e0fabacf35f807e19710def7ba243_JaffaCakes118
-
Size
577KB
-
MD5
5b1e0fabacf35f807e19710def7ba243
-
SHA1
458261a57d94bb58fc02039e87605ab486ee8e07
-
SHA256
9ec481849ac6bc985263c67265b5de77102efa150fb41eb78a1128c43ebb3646
-
SHA512
d57a956a7194dd4b50546b8f8aca1b68920d8d0fa35ffdf69933a3004aeb24380685675a42f95b24332a67a418083ad33c1ab647b4941a51d6904e073dbaba21
-
SSDEEP
12288:sAwebYuH8EbIg5TYzKPSIXijcBM0ezT0DK1c1FMbA09PmPrbaHU9:7wba8EbI1mWIKiMbA0Nmzba09
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-