General
-
Target
7f1058d62641015d073a4be94c86ff35_JaffaCakes118
-
Size
1.2MB
-
Sample
240529-bq5a2add73
-
MD5
7f1058d62641015d073a4be94c86ff35
-
SHA1
03b2beac1e58365389708080f587186fab6b6f06
-
SHA256
b9a80c263d04779089fa4d289f989734ce32c5689ea4a1953147489ac008e18e
-
SHA512
7516dc4306de51437811fbaa1d4eccb37af9a00fc3f0cd9387ea31d69ba91262850fecf3fa7a18f13e483d865d4b5762f30fa15291f8e2de10a9e3b2ca6835db
-
SSDEEP
24576:0k6+c2dm2ARIszvLcbtHQgXWjrrt/Px9IwoWHn37ZDlN7CqMonq:0bH37L4tHQljvFfnrZJNOonq
Static task
static1
Behavioral task
behavioral1
Sample
7f1058d62641015d073a4be94c86ff35_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7f1058d62641015d073a4be94c86ff35_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://efore.info/paclif/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
7f1058d62641015d073a4be94c86ff35_JaffaCakes118
-
Size
1.2MB
-
MD5
7f1058d62641015d073a4be94c86ff35
-
SHA1
03b2beac1e58365389708080f587186fab6b6f06
-
SHA256
b9a80c263d04779089fa4d289f989734ce32c5689ea4a1953147489ac008e18e
-
SHA512
7516dc4306de51437811fbaa1d4eccb37af9a00fc3f0cd9387ea31d69ba91262850fecf3fa7a18f13e483d865d4b5762f30fa15291f8e2de10a9e3b2ca6835db
-
SSDEEP
24576:0k6+c2dm2ARIszvLcbtHQgXWjrrt/Px9IwoWHn37ZDlN7CqMonq:0bH37L4tHQljvFfnrZJNOonq
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-