General
-
Target
7a6448589a7952c70e33a3126af694c4_JaffaCakes118
-
Size
1.2MB
-
Sample
240527-y2mlpagg3s
-
MD5
7a6448589a7952c70e33a3126af694c4
-
SHA1
c9282931a4f8380cd1a3eca4bc2c26904746a405
-
SHA256
d550733df6a74b1982a4e1068457fcb261056ab10a2f3b650387552ea8f43922
-
SHA512
0c30c697690c3fb124c30a38715e848f900209b7b4f22a525d1c5150a8bad8fbc156835425c99acb11aceef4114e593f4f434bb426d05c65044c1b0ee189413a
-
SSDEEP
24576:jgfnF7uJLa88eYRyjZAK2v80XetvageNMFBjh9XS+:jqnZUGeYRylAKwupTeNM3tRS+
Static task
static1
Behavioral task
behavioral1
Sample
7a6448589a7952c70e33a3126af694c4_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7a6448589a7952c70e33a3126af694c4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://fiseriy.nut.cc/wp-en/ssgjef3/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
7a6448589a7952c70e33a3126af694c4_JaffaCakes118
-
Size
1.2MB
-
MD5
7a6448589a7952c70e33a3126af694c4
-
SHA1
c9282931a4f8380cd1a3eca4bc2c26904746a405
-
SHA256
d550733df6a74b1982a4e1068457fcb261056ab10a2f3b650387552ea8f43922
-
SHA512
0c30c697690c3fb124c30a38715e848f900209b7b4f22a525d1c5150a8bad8fbc156835425c99acb11aceef4114e593f4f434bb426d05c65044c1b0ee189413a
-
SSDEEP
24576:jgfnF7uJLa88eYRyjZAK2v80XetvageNMFBjh9XS+:jqnZUGeYRylAKwupTeNM3tRS+
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-