General
-
Target
098348aea010d19465deba98336954ae_JaffaCakes118
-
Size
243KB
-
Sample
241002-h5wqrsxelh
-
MD5
098348aea010d19465deba98336954ae
-
SHA1
f400d9a7e05f6d5f20c3cecc2b69ba49965433e9
-
SHA256
a3344859309a5cd07fb73a59c06f8ebeb6eb9b0e4d4541b75f3ea0fd40d2e114
-
SHA512
466df2ed69173466509fde45ac923789dbbb9880d17ad57f5d3b37af55218dbb0842d1feb7d01f54d1453a7ebfa31f507a61abe9c30f234e4bb19e622007e93b
-
SSDEEP
6144:ZP/5kJw2dII9kPL/davMMGVn6vms2/9qvy:J/5aua0Me6ON/0v
Static task
static1
Behavioral task
behavioral1
Sample
098348aea010d19465deba98336954ae_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
098348aea010d19465deba98336954ae_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://gulfclouds.site/jeff/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
098348aea010d19465deba98336954ae_JaffaCakes118
-
Size
243KB
-
MD5
098348aea010d19465deba98336954ae
-
SHA1
f400d9a7e05f6d5f20c3cecc2b69ba49965433e9
-
SHA256
a3344859309a5cd07fb73a59c06f8ebeb6eb9b0e4d4541b75f3ea0fd40d2e114
-
SHA512
466df2ed69173466509fde45ac923789dbbb9880d17ad57f5d3b37af55218dbb0842d1feb7d01f54d1453a7ebfa31f507a61abe9c30f234e4bb19e622007e93b
-
SSDEEP
6144:ZP/5kJw2dII9kPL/davMMGVn6vms2/9qvy:J/5aua0Me6ON/0v
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1