General
-
Target
1e0c4989c25330809b09b384f14c1535_JaffaCakes118
-
Size
377KB
-
Sample
240506-ya4e5aah97
-
MD5
1e0c4989c25330809b09b384f14c1535
-
SHA1
99ed6ece8825c3a2ea8316fa07003f44f8cc47e0
-
SHA256
55eb233bc661114ccbc1941dedff2239de891ccf4b40d57ac0cd64f13a9492ad
-
SHA512
ba8cc55e01744f04ae86b7344f043e0c34088cf126a91316836693aa7b243ea41c35f68966bd33deed9b338a48d09a93fdfdfee59b2915ae31fd65fc5199ab6a
-
SSDEEP
6144:Rx7Dc3sgtdXoFzw+OBdFRxvhVGrzNBJuosy0Mvo2VM5eRfSTFwRLjCw:z0jdXou+idDljIuoJ7/GwhjZ
Static task
static1
Behavioral task
behavioral1
Sample
7WB2771.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7WB2771.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
lokibot
http://autocomms.co.za/dprove/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
7WB2771.exe
-
Size
726KB
-
MD5
cc52768fba25339bb3c573ce685bdd9f
-
SHA1
a8b8bc429b23081d830834f06df68b1b655980ec
-
SHA256
b7e6fc48e8a381fa0413834a185577a49644a8da2265bfa4e762703f89bc16a9
-
SHA512
83d62af8a730aeab0e4ce5685d8ded1f12bdf186afdd20f8e18cbd26ba9ce6397e03b35137d038d02cd86e98246d9dda5729b643e798a517751c0f4a66769148
-
SSDEEP
6144:y9S7DcJsGXdXQ5ze+OPHFPxvhVGFzNBJuYsU0mvoWVMNe3fSTFwwy:yS0zdXQM+iHlljouYBlzGwwy
Score10/10-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-