General
-
Target
90ef0714bbc96ec60d61ee9807e43b04_JaffaCakes118
-
Size
246KB
-
Sample
240813-a1wwzazelj
-
MD5
90ef0714bbc96ec60d61ee9807e43b04
-
SHA1
c56ff5f248d20de32f5a20e0d3a4c0b90b716a46
-
SHA256
0ac1851f68b0511365ecef5685690dfa6d34bfd6b93e290b602d7cff0e9e2254
-
SHA512
f50331f539b4d7c653db19075736745ef382580165c7d12c5ebf73fe3ebdc49bc06558e083cc33b256e9415b5815c5f2523b87c06ed9469c988b86a7a056ecbf
-
SSDEEP
6144:odUdjqYmQf6i287RT+KoGjOKiX302yXxsasRxH0ez5HooAI:/MQf6Pwd4Vn02UXs3UA5H4I
Static task
static1
Behavioral task
behavioral1
Sample
knRWhbakTycqG0L.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
knRWhbakTycqG0L.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://drsmarinegroup.com/lok/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
knRWhbakTycqG0L.exe
-
Size
314KB
-
MD5
c52d92fadb274e3b90d79145a38315d8
-
SHA1
5d90c8e69cc7f42bac6795c7fb6d218aa016b142
-
SHA256
0da0e7ed05790977b34ede6cd1b441e56be702b14c7705a3e72a22d12b479a32
-
SHA512
3b4b4c071ca7ed9c8c751ce778036076fa905a849a24b3630e49a7c0063a4d640c499a4d6f125525be99d16bcc5c9985f79a6819acad2304df05ae744d5a66bf
-
SSDEEP
6144:60clODFj6i2s7RR+KoGjSKiX304yXxN2Sn4EcmZHyXFaxmVmie9bngPbW69v:XlDl6PAD4Vn04UOSn4EcmZHAFaxmVmiH
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-