General
-
Target
fa16e82811b645cc7f5e1414899676d8_JaffaCakes118
-
Size
1.6MB
-
Sample
240927-kpzhtsthkl
-
MD5
fa16e82811b645cc7f5e1414899676d8
-
SHA1
1b70e5b93ea4912518c227ac2c9960150d3c3960
-
SHA256
a63992ce0bc36100131b6a53a595ee355bc26f2247a578fb42d125effd360237
-
SHA512
0b285fea79eafefea5ab52a566e6195cff1899dd27204512e4d9377d35f36f8cc166b49f3cae213c44a3b8e8ac5affe17d613e5470a1ea0254165ad67d1648a9
-
SSDEEP
49152:gkqGOtg2xYwF2mMcxsQIkqGOtg2xYwF2mMcxsQ:gRtzxYwZWQIRtzxYwZWQ
Static task
static1
Behavioral task
behavioral1
Sample
fa16e82811b645cc7f5e1414899676d8_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
lokibot
http://zero.vvinboss.com/sop/anel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
fa16e82811b645cc7f5e1414899676d8_JaffaCakes118
-
Size
1.6MB
-
MD5
fa16e82811b645cc7f5e1414899676d8
-
SHA1
1b70e5b93ea4912518c227ac2c9960150d3c3960
-
SHA256
a63992ce0bc36100131b6a53a595ee355bc26f2247a578fb42d125effd360237
-
SHA512
0b285fea79eafefea5ab52a566e6195cff1899dd27204512e4d9377d35f36f8cc166b49f3cae213c44a3b8e8ac5affe17d613e5470a1ea0254165ad67d1648a9
-
SSDEEP
49152:gkqGOtg2xYwF2mMcxsQIkqGOtg2xYwF2mMcxsQ:gRtzxYwZWQIRtzxYwZWQ
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-