General
-
Target
97b0422eee02d46ee0cb2f8dcafb88d3_JaffaCakes118
-
Size
846KB
-
Sample
240605-kwq52acc42
-
MD5
97b0422eee02d46ee0cb2f8dcafb88d3
-
SHA1
601d28e1c7d9af5259eecd34fe6250d8f85690e7
-
SHA256
903a5a9cfa14f379c5a4750ce9e3271d275f32aec8b19af8348ef23ee862cd86
-
SHA512
0b5a4672aa8aea7fa75e5cb5fde17e20aa9697b52bd2ad186cc70acfcadabe666d2eca1b8cddceee257124b0f6505400f9d6553599d181e56832b91a49497dda
-
SSDEEP
24576:0k6+c2dm2AmalMll2CSKjpG44GpUlX6qr/:0bHLMll2AjpSGpI6qr/
Static task
static1
Behavioral task
behavioral1
Sample
97b0422eee02d46ee0cb2f8dcafb88d3_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
lokibot
http://erxst.info/ret/four/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
97b0422eee02d46ee0cb2f8dcafb88d3_JaffaCakes118
-
Size
846KB
-
MD5
97b0422eee02d46ee0cb2f8dcafb88d3
-
SHA1
601d28e1c7d9af5259eecd34fe6250d8f85690e7
-
SHA256
903a5a9cfa14f379c5a4750ce9e3271d275f32aec8b19af8348ef23ee862cd86
-
SHA512
0b5a4672aa8aea7fa75e5cb5fde17e20aa9697b52bd2ad186cc70acfcadabe666d2eca1b8cddceee257124b0f6505400f9d6553599d181e56832b91a49497dda
-
SSDEEP
24576:0k6+c2dm2AmalMll2CSKjpG44GpUlX6qr/:0bHLMll2AjpSGpI6qr/
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-