General
-
Target
82aa9e8a427a68b553c11638d5913936_JaffaCakes118
-
Size
369KB
-
Sample
240530-b182zahh3t
-
MD5
82aa9e8a427a68b553c11638d5913936
-
SHA1
72f06ec1d34a390572c1103f59221a2705b5dd81
-
SHA256
cc1b599b0b07ac5d514a67d18193db0e8644375026fd2f73d5c173586a7be724
-
SHA512
2481e1a07af7fff4f3660b5e4b74255a272347c976852c5d2bc0e3321d941a65d312a5431265632714136c32ce62368765c295d5c6cadad129d5574038098de9
-
SSDEEP
6144:fl4X2seg8dDGkALc04T6o4/qN6FoINK6UZeTP5/0NVIMhgei2Ct:fSXSDucd42OtygP50VIMhgei2C
Static task
static1
Behavioral task
behavioral1
Sample
82aa9e8a427a68b553c11638d5913936_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
82aa9e8a427a68b553c11638d5913936_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
lokibot
http://89.34.237.212/annonymous/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
82aa9e8a427a68b553c11638d5913936_JaffaCakes118
-
Size
369KB
-
MD5
82aa9e8a427a68b553c11638d5913936
-
SHA1
72f06ec1d34a390572c1103f59221a2705b5dd81
-
SHA256
cc1b599b0b07ac5d514a67d18193db0e8644375026fd2f73d5c173586a7be724
-
SHA512
2481e1a07af7fff4f3660b5e4b74255a272347c976852c5d2bc0e3321d941a65d312a5431265632714136c32ce62368765c295d5c6cadad129d5574038098de9
-
SSDEEP
6144:fl4X2seg8dDGkALc04T6o4/qN6FoINK6UZeTP5/0NVIMhgei2Ct:fSXSDucd42OtygP50VIMhgei2C
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-