General
-
Target
304e98535152d8d0cd3468101b51700a_JaffaCakes118
-
Size
642KB
-
Sample
240709-pad1sstbrk
-
MD5
304e98535152d8d0cd3468101b51700a
-
SHA1
96d63a492090eca34343d2394fca0058c8fbfcf9
-
SHA256
4fe846bba1dc6830bde9724ec6046cdac76fdd5db7e885b6356ee4e6d3e3b495
-
SHA512
fa605f5805065e6b734a94df5cca500a79156cb1ff1295eb673b2645e98588651d660ee8dab404552ecc5573b6b3c9cd1b50156195933df82733a53fb6d0d4eb
-
SSDEEP
12288:SdLDc1IhBBBZEbP88aU/uEV1mrJT6YashlM0JT6YashlM6ZVaGiHO5UWeNS6sgjo:SN6IhBDsP88YEg9ashlV9ashlW
Static task
static1
Behavioral task
behavioral1
Sample
304e98535152d8d0cd3468101b51700a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
304e98535152d8d0cd3468101b51700a_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
lokibot
http://23.254.225.235/uyaka/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
304e98535152d8d0cd3468101b51700a_JaffaCakes118
-
Size
642KB
-
MD5
304e98535152d8d0cd3468101b51700a
-
SHA1
96d63a492090eca34343d2394fca0058c8fbfcf9
-
SHA256
4fe846bba1dc6830bde9724ec6046cdac76fdd5db7e885b6356ee4e6d3e3b495
-
SHA512
fa605f5805065e6b734a94df5cca500a79156cb1ff1295eb673b2645e98588651d660ee8dab404552ecc5573b6b3c9cd1b50156195933df82733a53fb6d0d4eb
-
SSDEEP
12288:SdLDc1IhBBBZEbP88aU/uEV1mrJT6YashlM0JT6YashlM6ZVaGiHO5UWeNS6sgjo:SN6IhBDsP88YEg9ashlV9ashlW
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-