General
-
Target
32d22136aaa9afb4af8edf1f4a69009d_JaffaCakes118
-
Size
335KB
-
Sample
240729-cp5qvaxhlp
-
MD5
32d22136aaa9afb4af8edf1f4a69009d
-
SHA1
f315adecebc4046f9848215079b27826abc08e74
-
SHA256
e3c94b033b803e1f45f6da9e0fb141fea38c55068c975404ca99e4c49dbee45a
-
SHA512
774989c40cc1559cb9b5a73cafca80e6a56bad4d88611efb21ea136982de04ca40707bb4688c1c1d4955748b4f1cfe02a1fb139ef9067745fa90324dffda304c
-
SSDEEP
6144:DpZppfYW645usKoklQjEFU/SON44FzzOiQOGaoqnXKO7bhnm/dEqp+UZO:DpZppfYq5uskqEFISOnF/dXKO7bhmRpY
Static task
static1
Behavioral task
behavioral1
Sample
Surat_Penyerahan_PPH23_update_july_2020.pdf.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Surat_Penyerahan_PPH23_update_july_2020.pdf.exe
Resource
win10v2004-20240730-en
Malware Config
Extracted
lokibot
http://globalex.uz/gg/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Surat_Penyerahan_PPH23_update_july_2020.pdf.exe
-
Size
575KB
-
MD5
13187746c5e3d526db4f5fa97218fc59
-
SHA1
d8c4e08595fa4e16ac65bd619a8e701e10566a30
-
SHA256
4dd20ae06b9a6d97087f3b7023bd68847640a6326d532029859472142cfbb9fb
-
SHA512
c246b0dee145da8af8db8bff3486908b87f67469a4694317919ab0c58dc6aa59407163eb271f7773d3ba1ba2b78a1958f462dca70b5c568986a46fcac9a9d1ac
-
SSDEEP
12288:ZPOuvPFClYKfrf9fN30Wvza5TQ9DwVYCc4qjx:ZGIPQYKT9lcxODgYTjx
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-