General
-
Target
3548d4c1812e0427c0366354ea0a976d_JaffaCakes118
-
Size
171KB
-
Sample
240710-srhl4axdrc
-
MD5
3548d4c1812e0427c0366354ea0a976d
-
SHA1
ac63ee9205498ae8ec61559adb516d290a3a98ac
-
SHA256
737e8c1bb2310d364d9ab0eec4c8a04042e56ccfe56d993360eee96528fc0af2
-
SHA512
8460ef4d1086181126f324887d28523fc02ac221cddd70e7e075654572be1aa7861ddc9375be72ecf520be034b8c18858dde1d4336a293c6199b796635b6c93a
-
SSDEEP
3072:IuGb/SWCzVOzvpMdQ/eeSq1jCY+Mr/E+Dtqn0ArQOlyjB9Ur1iRzvpktLOLq3RLJ:gG5fQ2eH1mYf/E8ArJyYrsFpmOLqBY1O
Static task
static1
Behavioral task
behavioral1
Sample
Material Requisition (Technical Requirements).exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Material Requisition (Technical Requirements).exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
lokibot
http://umarguzardijye.com/work/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Material Requisition (Technical Requirements).exe
-
Size
302KB
-
MD5
55888d7c8305ccc5d2547f02ea5efe1b
-
SHA1
a3c7d3144f89595380d755ef4d806737028458a6
-
SHA256
572e22283bac84f3439061bf4a127fc5fc3be6c9bb61d0b28190b231098ca9ee
-
SHA512
035dfd42884a901fb7fc421c8ee21dc91042a971a1cac2a856be3ea3e4d77087c7b67e012bec2f9d7af3a2670d40a716e00772812cdb42f034bf87f1765c0c2b
-
SSDEEP
6144:1gn8irYJhSC4KdDKoP3I5qAQELNmCIKb:emJh/lI5qAXNmCIK
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-