General
-
Target
7c5469a4c1c1c75d2b25abc58d084a3f_JaffaCakes118
-
Size
856KB
-
Sample
240528-kfas4sdg32
-
MD5
7c5469a4c1c1c75d2b25abc58d084a3f
-
SHA1
f84a814858846b0041fe7746799390eb1758f41e
-
SHA256
0fe1101fbf2ad4cb5e1a24aaaf9ccf3b42495cc1af0dbeed41d946e12090ea32
-
SHA512
86a19da8735b1332bb45c49fef3949138840eefccff49822fa1fa2176588381930d121f8de14b660aa11e01dcf762d723d5b7f1bf4e3a4caee9432ee8efc0766
-
SSDEEP
24576:0k6+c2dm2AzwLFv24cHJHbefui0Cy6fOIcRCl:0bHsQ3HJHyfui0CbfOk
Static task
static1
Behavioral task
behavioral1
Sample
7c5469a4c1c1c75d2b25abc58d084a3f_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7c5469a4c1c1c75d2b25abc58d084a3f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
https://erxst.info/bjoe/herold/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
7c5469a4c1c1c75d2b25abc58d084a3f_JaffaCakes118
-
Size
856KB
-
MD5
7c5469a4c1c1c75d2b25abc58d084a3f
-
SHA1
f84a814858846b0041fe7746799390eb1758f41e
-
SHA256
0fe1101fbf2ad4cb5e1a24aaaf9ccf3b42495cc1af0dbeed41d946e12090ea32
-
SHA512
86a19da8735b1332bb45c49fef3949138840eefccff49822fa1fa2176588381930d121f8de14b660aa11e01dcf762d723d5b7f1bf4e3a4caee9432ee8efc0766
-
SSDEEP
24576:0k6+c2dm2AzwLFv24cHJHbefui0Cy6fOIcRCl:0bHsQ3HJHyfui0CbfOk
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-