General
-
Target
7d7a407525b33c6a65a7dc28633452ff_JaffaCakes118
-
Size
519KB
-
Sample
240528-s1kstabf38
-
MD5
7d7a407525b33c6a65a7dc28633452ff
-
SHA1
27da4e3ae0efe231661ff308d7f732ea7174f21c
-
SHA256
022af0ecf3a521d7f3605b381de45bd38712034750cdfedfef575204009601c9
-
SHA512
b22871a5c4237d8acd109088eda2d898294c5a19dce1936ec9a8b2b50a11447910611d2deeea4c8fd489cf3618c5366ed954fe61c1c6b740f5b284c3b425fff5
-
SSDEEP
12288:B8NW8/P4jNbilT4gnDyiFBD9h/IcjV+vM3x4cUQ48wvEMgkR:BmWWuTOOiFBDDIpMKHkkR
Static task
static1
Behavioral task
behavioral1
Sample
Ship88912.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Ship88912.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
lokibot
http://jumbie.duckdns.org/pursuit/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Ship88912.exe
-
Size
639KB
-
MD5
7fbbde39e6948f8bf39b4711cee0bcfb
-
SHA1
bda562ef58f8bb0d20ae6d51adf695cbb6dcd9df
-
SHA256
c36a6d093a31124e6b050c3eb81b366560f6d511771a6fed3424877ce4992ff7
-
SHA512
f46ceefe9ec9efe556b98933245be0b8871e539c2da2589a4fd5e2b5a08da79b29c361ff4a6530fcecd22ab94b2253aaa6759b6f488de8a5d12bb9c2ee15daa6
-
SSDEEP
12288:uJWgxAqTvbqbWTsX+tGwOH0UZ/Icz3D+vs3x8chtMCl8wvEugkN:zglru6TUwOUmI238sOcWCzEkN
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-