General
-
Target
754cecba9022cd223e85616a62e55048_JaffaCakes118
-
Size
683KB
-
Sample
241024-3l6f3sxgpa
-
MD5
754cecba9022cd223e85616a62e55048
-
SHA1
893ef3f24fc567ceee6c26ffff8ccdb89677e6fc
-
SHA256
ae5613f24c71abd3b7e9c263bb37eaffab6c4b859e2264709f31e4db88df803d
-
SHA512
5fc59afaf949946adf911552b3a150ba8ffa4ebec9ca3d90b8de875043777f22a98e440f524878595120385ff7f5b7bf5c59945b501a1bf674369bdea62a8d9d
-
SSDEEP
12288:xEz6HK7zH7vXOXfJG/101DOky96cFNvy2NHSevEPs/i8Y9BWXR:mzpT7f2JGd01V46celpPs/w9w
Static task
static1
Behavioral task
behavioral1
Sample
754cecba9022cd223e85616a62e55048_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://185.227.139.5/sxisodifntose.php/W6WAeRBLKcGxR
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
754cecba9022cd223e85616a62e55048_JaffaCakes118
-
Size
683KB
-
MD5
754cecba9022cd223e85616a62e55048
-
SHA1
893ef3f24fc567ceee6c26ffff8ccdb89677e6fc
-
SHA256
ae5613f24c71abd3b7e9c263bb37eaffab6c4b859e2264709f31e4db88df803d
-
SHA512
5fc59afaf949946adf911552b3a150ba8ffa4ebec9ca3d90b8de875043777f22a98e440f524878595120385ff7f5b7bf5c59945b501a1bf674369bdea62a8d9d
-
SSDEEP
12288:xEz6HK7zH7vXOXfJG/101DOky96cFNvy2NHSevEPs/i8Y9BWXR:mzpT7f2JGd01V46celpPs/w9w
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-