General
-
Target
317cb6e4f1f4545c67f28c3bf7e1dbda_JaffaCakes118
-
Size
468KB
-
Sample
240709-w416razfja
-
MD5
317cb6e4f1f4545c67f28c3bf7e1dbda
-
SHA1
dc061243fa1dbee5ee2c64fd9552e9ac6ed846c4
-
SHA256
b716ebdbe1fc336fb934f879c1d0966c8aa61ac16d52edf1bc687f9bd1d2dfde
-
SHA512
e659ba4fb8a62d330bf9961544a59283c3f59a0130e8fcb4bddb3b1d570fca8181ccd0c6ade5198708af2f1410f436818246a3de54489b230911c585d485bc42
-
SSDEEP
12288:ZSNXeOH/yoGpKbUqq8hwnE8LoWgU8KwmW7LoFok9j/lUb:oNPBMUUqKE88KtWXoSkte
Static task
static1
Behavioral task
behavioral1
Sample
Bm6ssTH5I9vTVqF.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Bm6ssTH5I9vTVqF.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
lokibot
http://51.195.53.221/p.php/2dY9AG7m0LNWP
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Bm6ssTH5I9vTVqF.exe
-
Size
526KB
-
MD5
85bea6e356c3c21984099b9c0dc186e4
-
SHA1
e52f7214470c9dd0d28dfa0ce75e9f124641276e
-
SHA256
ed6b6473d09425f88d6ef29939f2eb65e9566b91571d6cb6a366f689d4b667c0
-
SHA512
7f04f07afdb6a0be86f7fe00b1afd77414620e5df845f99acf8b7b4be6a4298b30bf7fa6f7438e7a8445a31a5aa9d5f9da55ec6f22098078549f3efc7ebeaf93
-
SSDEEP
12288:qGYBE6fvxnFOjD/JfZX3erjsSE83jpnnqPtxmFy4lpiVw:GlNwNR3erYSx3jtejciVw
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-