General
-
Target
0f58e05fb244673c1f0c10f556f0bc0b_JaffaCakes118
-
Size
417KB
-
Sample
240503-bqck1sbe5y
-
MD5
0f58e05fb244673c1f0c10f556f0bc0b
-
SHA1
d40a8f22e2c4e616eb99cd4d49cad4f61e060142
-
SHA256
235678afae67a874474bba158f96246ef5ca70292521e2b22b789021398cb3e6
-
SHA512
6cbd8fa6fc97580342f086ebde981cdc5afe97a2d87d6ebf0679cc3f956b739695a0c26d2b6c0b742e102b8151dec8c5aeb065d91e32bc2754e6c085b55dc0e2
-
SSDEEP
12288:kyu5RCaq3A+8E6rGzOm0V6HDyHEX1JzzBbYpz6:Fu5RCfw5rN2+EbzVspO
Static task
static1
Behavioral task
behavioral1
Sample
ETD 15-09-2020 (MV.HYUNDAI SUPREME V. 102N_PDF.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ETD 15-09-2020 (MV.HYUNDAI SUPREME V. 102N_PDF.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
lokibot
https://tkanilux.com.ua/wells0/wrgo/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
ETD 15-09-2020 (MV.HYUNDAI SUPREME V. 102N_PDF.exe
-
Size
803KB
-
MD5
e6681861bd070231aeb0a739e821e7c4
-
SHA1
99ee12bc70b3d123bd2fdbb4b0b0f42f01fe678e
-
SHA256
af32eccfa67cab29e2766a587fe7139aa89e76d012b37ef074aa1c4cd086141f
-
SHA512
dad693de4634eb8fd1a2100ba8062cbaa8be4557686f6312aaaf42e424cfad8feec8791e0b9b00faa5f74161e7f3fa9778f6b038ffc65052ab4a5ec7fbc1e830
-
SSDEEP
12288:eb6mCM9sXHh9BoRPqsxOVKuS5r70xwgeqh043L97/hOCR0N17lz:veSHhYRRxOVGcxJBdb1knp
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-