General
-
Target
4e07df2c057c3f144decf9af3409c471_JaffaCakes118
-
Size
340KB
-
Sample
240729-sgdkdstfnl
-
MD5
4e07df2c057c3f144decf9af3409c471
-
SHA1
8de9e8419666b5d1dc979964eaf0eea349a527f5
-
SHA256
a43336d3a04f84125f7603032b543cdb794fe98f2b3e44dca0c3f241a83abc79
-
SHA512
7c1b5a85b46f420fe7adb0ac0de67e37032171b6b9003624cf954dc87cc9161aeff9491ba95709e570d5dcbcfd2b17bd8b3592624513f9e71f9ea0c80bd5ad91
-
SSDEEP
6144:wsojWjOtOXNkh1nEOyW6aHnnGtNPUJk9nKUy//NnFxU/7ReFUD:wseOXSfdZHn6umnKX/VnueFO
Static task
static1
Behavioral task
behavioral1
Sample
Invoice-MAJW-18-06-2020.PDF.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Invoice-MAJW-18-06-2020.PDF.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
lokibot
http://purinex.co.id/k2/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Invoice-MAJW-18-06-2020.PDF.exe
-
Size
573KB
-
MD5
7d3cd87b7ae39c73b72ede9413d7f2e2
-
SHA1
d3f5aa9426b5ba1eaf0a79986bb2336bdc03f07c
-
SHA256
2dd2cafba54d0f7610c085a225debb2297cbe70d95b65833f85a0d62cfda6a87
-
SHA512
e3d21ef61bad84ab5a852dc707af444214110fc85508ce9ee79c74cfe2a5845866f615852875b6c7c2caa90a16869a777ac67063bb2736a1333522bd124721df
-
SSDEEP
12288:EBRcXM3Uc4yEUdqhfwxgcQYRpS3hF6vbYfHFJsAicpr:oUBcxqhffV2vbWHFJ9
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-