General
-
Target
45a33ccbd58c5e6033e758409c7d8d2c_JaffaCakes118
-
Size
171KB
-
Sample
240714-npnccaycpn
-
MD5
45a33ccbd58c5e6033e758409c7d8d2c
-
SHA1
d9ba19b720ea87b87538d13fad0710cbf5bdc779
-
SHA256
23b61d5cf710aa3b507eab972672572c6a3febb8f70fe81d35541b24cf6462f6
-
SHA512
7e64b7371ca294dfe41216ed6a17051b19d970b236bb4e0f0619678ff647aa930ecd56808a623e7030ef15fd49e4b0f2112abab9df411ca86b102a3892812d97
-
SSDEEP
3072:suGb/SWCzVOzvpMdQ/eeSq1jCY+Mr/E+Dtqn0ArQOlyjB9Ur1iRzvpktLOLq3RLJ:cG5fQ2eH1mYf/E8ArJyYrsFpmOLqBY1O
Static task
static1
Behavioral task
behavioral1
Sample
IPP_Commercial Terms..exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
IPP_Commercial Terms..exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
lokibot
http://umarguzardijye.com/work/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
IPP_Commercial Terms..exe
-
Size
302KB
-
MD5
55888d7c8305ccc5d2547f02ea5efe1b
-
SHA1
a3c7d3144f89595380d755ef4d806737028458a6
-
SHA256
572e22283bac84f3439061bf4a127fc5fc3be6c9bb61d0b28190b231098ca9ee
-
SHA512
035dfd42884a901fb7fc421c8ee21dc91042a971a1cac2a856be3ea3e4d77087c7b67e012bec2f9d7af3a2670d40a716e00772812cdb42f034bf87f1765c0c2b
-
SSDEEP
6144:1gn8irYJhSC4KdDKoP3I5qAQELNmCIKb:emJh/lI5qAXNmCIK
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-