General
-
Target
a1dded515ea0cc09854ed0193105aaea_JaffaCakes118
-
Size
1.2MB
-
Sample
240612-xmje2swcrh
-
MD5
a1dded515ea0cc09854ed0193105aaea
-
SHA1
da49ac5f84edc4fb63ba23f61c0abfbd922b0776
-
SHA256
7126b9d0de680355966b9a425760499207c227177b7addea9239b84d0f9d6d96
-
SHA512
ce554f165c554c27b79fd12801c7e1219c418c4120492def34064da04aecb4c346e94577ff8d6678d1184c2a0867e59d579b65c68efd1d7fd7c5a747aa0d2aa0
-
SSDEEP
24576:6NA3R5drXfdrDoOJxEDIijCJnQtu1h6LId7nT1RMwan3vcXB+hX:z51rDbJfijC91h6LIdzTXM7yB4
Static task
static1
Behavioral task
behavioral1
Sample
a1dded515ea0cc09854ed0193105aaea_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a1dded515ea0cc09854ed0193105aaea_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://107.175.150.73/~giftioz/.boyvi/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
a1dded515ea0cc09854ed0193105aaea_JaffaCakes118
-
Size
1.2MB
-
MD5
a1dded515ea0cc09854ed0193105aaea
-
SHA1
da49ac5f84edc4fb63ba23f61c0abfbd922b0776
-
SHA256
7126b9d0de680355966b9a425760499207c227177b7addea9239b84d0f9d6d96
-
SHA512
ce554f165c554c27b79fd12801c7e1219c418c4120492def34064da04aecb4c346e94577ff8d6678d1184c2a0867e59d579b65c68efd1d7fd7c5a747aa0d2aa0
-
SSDEEP
24576:6NA3R5drXfdrDoOJxEDIijCJnQtu1h6LId7nT1RMwan3vcXB+hX:z51rDbJfijC91h6LIdzTXM7yB4
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-