General
-
Target
a67c13ca70d60247253b6b329bcea0c0_JaffaCakes118
-
Size
1.2MB
-
Sample
240613-tw8vhszfpj
-
MD5
a67c13ca70d60247253b6b329bcea0c0
-
SHA1
eee58ee3fbc96b248b9b156df162187c8ef73fcf
-
SHA256
1d7b28dda54ec1a9b7003d01cd37bb495feccde98355945ae0370e51e6fa0f74
-
SHA512
3bdc1b93d02a9fcdcd1a75989149f084c6bbf616f97c723016d6477a1cb75aa6c75796024ee4dd534ad1f54c4647d4d42991324c99fd0f759f33a591707d59a8
-
SSDEEP
24576:8fc5/XLJWXJyM5wvzMJ6Rbdg8QyxQ2vHYV:8AdJPzi6HgFi8
Static task
static1
Behavioral task
behavioral1
Sample
a67c13ca70d60247253b6b329bcea0c0_JaffaCakes118.exe
Resource
win7-20240611-en
Malware Config
Extracted
lokibot
http://devhaevents.us/22334455/anel/alive/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
formbook
3.9
hx314
xn--u2u404a.ink
test-gogoatrip.online
solution.direct
neurofoodmarketing.com
doubleplanetoid.com
bashouda.com
snaghawaiianvacation.com
imanamericandreamer.com
object-j5gcpzx0sqdhnwmvl.loan
imperiallivingatl.com
1399pk10.com
foreverstrawsco.com
amandabreenforketchum.com
zgtmn.com
66463dh.com
peizi33.com
xxwgdw.info
jjgallocpa.net
isolate.solutions
chineseformula.com
dc-eas.com
130yxn.info
parapuglia.com
mysecretaddress.com
floridabusinessconsult.com
bestgulbi.com
maisaloha.com
browneyedbakerfun.com
pk874.com
classica-foto.com
559ope.com
ofun.ltd
2zh4m.com
thebiosimilarsalliance.biz
cryptogage.com
extension-cils-reunion.com
maliburanchwellnesscenter.com
cacommenceaujourdhui.com
onmyoji-kouryaku.com
pict.cloud
the-conference-buddies.com
ledean-pauvert.com
furin-furin.com
zjko2o.com
qmsmeds.com
602956026ming.com
deeppixelworks.com
hearlife.film
glassvibes.com
exaxuyn.com
495manbetx.com
jasapparel.com
wls11.com
logodesignloot.com
stvple.com
cleanmeatburger.com
wemovieblog.info
travelcubaamigos.com
katz-overstreet.com
ms-field.net
withmal.com
collab.money
maptudios.com
moveoptimizer.com
nadidetadllar.com
Targets
-
-
Target
a67c13ca70d60247253b6b329bcea0c0_JaffaCakes118
-
Size
1.2MB
-
MD5
a67c13ca70d60247253b6b329bcea0c0
-
SHA1
eee58ee3fbc96b248b9b156df162187c8ef73fcf
-
SHA256
1d7b28dda54ec1a9b7003d01cd37bb495feccde98355945ae0370e51e6fa0f74
-
SHA512
3bdc1b93d02a9fcdcd1a75989149f084c6bbf616f97c723016d6477a1cb75aa6c75796024ee4dd534ad1f54c4647d4d42991324c99fd0f759f33a591707d59a8
-
SSDEEP
24576:8fc5/XLJWXJyM5wvzMJ6Rbdg8QyxQ2vHYV:8AdJPzi6HgFi8
-
Formbook payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-