General
-
Target
339adc2685ef8e509350b06375f13fed_JaffaCakes118
-
Size
348KB
-
Sample
240710-gyj8qa1dpp
-
MD5
339adc2685ef8e509350b06375f13fed
-
SHA1
98b96cdc973a158038a434215f4acb36db59119d
-
SHA256
be43fdebede61ab9a4fb2638237498d62f74ac031477ad0546f8d679a97df801
-
SHA512
58d061a10d7eecbc269f81666573c78bfb307ca6eb68d835884e3a82c663811f8133bf8f766900ec3f90e65451ebe7e24a915185a8a5814f21c1e4326e0dbba4
-
SSDEEP
6144:wNXsSCMX0+fgOPxYRArvZ5/U3pLKvROSU5sYPVDP+KPDYYmLe42bKiO2uqJJzwpP:wNX/CKFzZrvZ5/UURO9eYZ6YE2bwPqL+
Static task
static1
Behavioral task
behavioral1
Sample
SOA {JAN} & Swift HSBCCNSHXXX confirmation_xlsx.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SOA {JAN} & Swift HSBCCNSHXXX confirmation_xlsx.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
lokibot
http://byorn.us/kali/kali/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
SOA {JAN} & Swift HSBCCNSHXXX confirmation_xlsx.exe
-
Size
916KB
-
MD5
1f153afa1eb2fc6c36833561df336720
-
SHA1
702a477651fb5c0157eeafaf536cd5db47644ed7
-
SHA256
4ea340bd4396f2dc2550ce2de10c7787242a29e2f0f2602b85f41a89e9059227
-
SHA512
0d1d5949804651dd3ee72606a2a7386a4d84683e3ed9d3f7ce33f7a1edf274a6273ce6e2c5474451d8613a7a056865d2b823235951d786e6063d8057075cb660
-
SSDEEP
12288:mEmzpE5j6jRPLjRPqjBjjyjBjBjBjBjLjG+jdgjkJtymmDXnUFmnwFMENYGvW53:tvILyJDcMAaIW5
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-