General
-
Target
fe3bac9537f8f1fc4ed4551dbb50acc7_JaffaCakes118
-
Size
555KB
-
Sample
240929-lc8fmsxgml
-
MD5
fe3bac9537f8f1fc4ed4551dbb50acc7
-
SHA1
6405038b35dadee97d717624f595ecf195c380cb
-
SHA256
3216b19575630a8841ce5432df563e1a37814abfebb2e3d3714239c7757498af
-
SHA512
1c77afa9d9492a7c48cd96262d264a1fcaeedc96f9d57847afb115c31422a96799ede408dd4b6aa542bc5ba9932030d77870797429786eb7bee4c56aa6a24fbf
-
SSDEEP
12288:Wv60z0h4sitPThriU7St/DNGqwjRT92SWOPI/+esTCml:zph4sCPTh+UE8iS92ml
Static task
static1
Behavioral task
behavioral1
Sample
fe3bac9537f8f1fc4ed4551dbb50acc7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe3bac9537f8f1fc4ed4551dbb50acc7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://fashionstune.com/bd/admin/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
fe3bac9537f8f1fc4ed4551dbb50acc7_JaffaCakes118
-
Size
555KB
-
MD5
fe3bac9537f8f1fc4ed4551dbb50acc7
-
SHA1
6405038b35dadee97d717624f595ecf195c380cb
-
SHA256
3216b19575630a8841ce5432df563e1a37814abfebb2e3d3714239c7757498af
-
SHA512
1c77afa9d9492a7c48cd96262d264a1fcaeedc96f9d57847afb115c31422a96799ede408dd4b6aa542bc5ba9932030d77870797429786eb7bee4c56aa6a24fbf
-
SSDEEP
12288:Wv60z0h4sitPThriU7St/DNGqwjRT92SWOPI/+esTCml:zph4sCPTh+UE8iS92ml
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1