General
-
Target
b6b51be0520bfcaad93b457a441688e3_JaffaCakes118
-
Size
346KB
-
Sample
240617-evhvdatemg
-
MD5
b6b51be0520bfcaad93b457a441688e3
-
SHA1
0f66514f6d3bde763275fe00ece2e94dddbb5c17
-
SHA256
cc3e2f7cc6f9ae027adfec912f9f5b0e940512b73bb3419f9db4ee9d6ac0a84d
-
SHA512
6a65779ef2719e451f2467331cd21d74f00f08384756e5e86f719557cc294617f813cbf116bfded23d80cf058d72ba5ffe022156b334e2750c9d8c46f2bbbfd1
-
SSDEEP
6144:qaJIiGfiGP4E2b7z/TU4QyAB6UeZSlxHL7sb/TwhhVYlgrsBgNLeoDaHCBMJPoa:qaJIiUizL/frk6xw7sbTwjVYIsBgNLeL
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT_ADVICE NCB6290003457110200.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PAYMENT_ADVICE NCB6290003457110200.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
lokibot
http://mygreencity.in/scripts/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
PAYMENT_ADVICE NCB6290003457110200.exe
-
Size
595KB
-
MD5
38c3d61edf3f095d58a36a65ba15c8e8
-
SHA1
7a86f2f6b648de12fe26d717dcb435a99393fc83
-
SHA256
4ca9b45f58ea29095253e13f744267b11cb632aed3aad9e3e4abee0d153d9d38
-
SHA512
b967b597140e16e58affc28152bd7009960dede4921801efd3397c26417cb1fe2285304d431f7e2a7467d9cf4c6f32671a108fa8de3cd01b529f4d4d58fcdc96
-
SSDEEP
12288:VEv8FVujUpVTWgThfJ614X5p/iYHI0Oq8M0oko8ZiFhDF8KSpTTj/Xi0wbO/a3:VEEbuQ9WmD1HITPTnXi0wbqa3
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-