General
-
Target
110a31b6aada6411c637c33118215584_JaffaCakes118
-
Size
593KB
-
Sample
241004-ahm64stgmn
-
MD5
110a31b6aada6411c637c33118215584
-
SHA1
023187c4ecbf3c580a9dbe06ff52d1a957e8c6f1
-
SHA256
d9a989dca775cffef53b424b84f483da5ea6a763c180f53ae51a3d080ac936ab
-
SHA512
a8606c147a052c19159836d3884aad5aeb0e8a637fc684a8a00622b4a9a3eec4f5c586a4f905468d187b9ba9258da83e6fcd847849c0b067f08aadd864ec91fb
-
SSDEEP
12288:D+EO/HK7zwgkC6xHyKsZfMwE1bKwfKGwf7BVr7e2HriQYpwvAF6gCT:DJ8gGByIwE1uwfKGw1VGKDyVF6gCT
Static task
static1
Behavioral task
behavioral1
Sample
110a31b6aada6411c637c33118215584_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://185.227.139.5/sxisodifntose.php/W6WAeRBLKcGxR
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
110a31b6aada6411c637c33118215584_JaffaCakes118
-
Size
593KB
-
MD5
110a31b6aada6411c637c33118215584
-
SHA1
023187c4ecbf3c580a9dbe06ff52d1a957e8c6f1
-
SHA256
d9a989dca775cffef53b424b84f483da5ea6a763c180f53ae51a3d080ac936ab
-
SHA512
a8606c147a052c19159836d3884aad5aeb0e8a637fc684a8a00622b4a9a3eec4f5c586a4f905468d187b9ba9258da83e6fcd847849c0b067f08aadd864ec91fb
-
SSDEEP
12288:D+EO/HK7zwgkC6xHyKsZfMwE1bKwfKGwf7BVr7e2HriQYpwvAF6gCT:DJ8gGByIwE1uwfKGw1VGKDyVF6gCT
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-