General
-
Target
80d063bed9b15855725247e0b7769022_JaffaCakes118
-
Size
224KB
-
Sample
240529-p7jbsafh68
-
MD5
80d063bed9b15855725247e0b7769022
-
SHA1
795a2eecfcdd5ccdd533edc674c2092ee37a25aa
-
SHA256
5524636c5b3d49f1dafb9d4d702e54f004a724cc8e6f30210eb4076318624806
-
SHA512
a57557533f12e530c9bc2d322cad03cff8af9405e4136c5778523b4218c6cb9f9aae6aaf790c9b4405b474a63610b536fbd77a78eb49b89ad8db92b632dfcfc3
-
SSDEEP
6144:UyRQREq2bb90ht781Q+EjQYNrTb67i6ZX5sFfGmI47G:UyRQRH2S3bqmPJ6ZX5gOmd7G
Static task
static1
Behavioral task
behavioral1
Sample
Contract-PO#3112 , PDF.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Contract-PO#3112 , PDF.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://shungkargo.com/hoist/logs/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Contract-PO#3112 , PDF.exe
-
Size
264KB
-
MD5
2fe6d6977a4f4c872972251f44e8da96
-
SHA1
c229e283a2f5acc521e0ddf4ddb4b38b6b789d50
-
SHA256
1d4569c5de3bbc1c1b6a430bd4ca0652a9b91823faa19aa433dc87d408efa8c7
-
SHA512
29d1fba6edea241b17244c8f9fc3b706fdd30b53b55f339f9bcb388ff56b8bf506c4cb511dc9275997197f8e55ec326ecd8691b917f21e08beea42ab98fdd57d
-
SSDEEP
6144:LMyqKXpO6nmk4/A4fgMrgcPCgXKefw+Ya4:jqKXsjd/AXcg+n45
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-