General
-
Target
6638d5300b1a25f07aa08472d8b537f8_JaffaCakes118
-
Size
1.2MB
-
Sample
240729-24dncazcnf
-
MD5
6638d5300b1a25f07aa08472d8b537f8
-
SHA1
84ce1185dc19e03530e71eb0f37200d2e35718e2
-
SHA256
8dd56c5aa40f91ae736c97689bab5066c2fd86f5a3cd181851579dcb5b42ed50
-
SHA512
53cbafc5ebeacc311a4355fcd5b4bf5d84f533efad396643b02a30a671219b86b824b94e4ed83c33016ca44d4685138d4d46bad5682ffd741e6bd2a30eb233cc
-
SSDEEP
12288:8BRcXM3Uc4yEUdqhfwxgcQYRpS3hF6vqA+T7C/9qOo:QUBcxqhffV2vDEe/
Static task
static1
Behavioral task
behavioral1
Sample
Packing Lists.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Packing Lists.exe
Resource
win10v2004-20240729-en
Malware Config
Extracted
lokibot
http://79.124.8.8/plesk-site-preview/chongelctricals.com/http/79.124.8.8/que/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Packing Lists.exe
-
Size
580KB
-
MD5
1b0d830a35b27bf1d8921df876d72c20
-
SHA1
ef5c6defb67e3a73f7fb36668e8cd6901d72bab8
-
SHA256
b3632e0dd5c285e714fa880ab59e27fbc7678b220dd19661587b4501f9df51f6
-
SHA512
a7af313f3e547645e84818e3506c164ac3935f0980c57cdcbbf8d810e11726821efc2e1a9a198c07ba894029f6a3ef583c955d8d2ac41857763ba7effb8c1cc3
-
SSDEEP
12288:MBRcXM3Uc4yEUdqhfwxgcQYRpS3hF6vqA+T7C/9qOo6:AUBcxqhffV2vDEe/1
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-