General
-
Target
5904ec8848e4305a3b30faf7a69c61b9_JaffaCakes118
-
Size
291KB
-
Sample
240729-xc25eatgkq
-
MD5
5904ec8848e4305a3b30faf7a69c61b9
-
SHA1
84939d454d3c6bdeff97b2f7ff73b036e1783c81
-
SHA256
4b9e64c6e0cb28b241242f4b659a42956d00d2b4ddd1793486fa478c81dd0ca9
-
SHA512
bf05ebb6244919bd896ad90087aaed2a907c6d7ddaa796757c1102859ccc186514024f7a07bc0e7d0e17ce44a59d66c647879f1a7f1ab3812a031f87ff8c1812
-
SSDEEP
6144:LtH30+B2pin6XBArf2/8kQwC5UyPyLN3hilIHPGhtrz+ihJD:LG+BMuf88kxCVa5RoIYlzV
Static task
static1
Behavioral task
behavioral1
Sample
eInvoicing_pdf.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eInvoicing_pdf.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
lokibot
http://195.69.140.147/.op/cr.php/n6RgdJQ4XDaGY
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
eInvoicing_pdf.exe
-
Size
675KB
-
MD5
2b263636706fe618e7dc41e611ad9493
-
SHA1
21f2f6db2f81135ed00aa3e2549ab401ef571f8b
-
SHA256
a70bba83ae2d498368562988a73c7a24018d6e81235b7282146607f0e20a89c3
-
SHA512
3b29e38febc0cab219f2864f68300cea2dc38986fe8ae280f2da69c19b7f22b45962b510dabe019d3baea421a1262e0903eefb42ea7abcc0e783e2ce994a9d49
-
SSDEEP
12288:z52W/RxLftGwLk0kZSLQhxoIzbDt9VjW:zUWJxjpLkZZSEhp3VjW
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-