General
-
Target
c1b655434a04968b30dcd71b3b0a5681_JaffaCakes118
-
Size
904KB
-
Sample
240825-2a6f9sycqe
-
MD5
c1b655434a04968b30dcd71b3b0a5681
-
SHA1
bd6502f94d91ffbe844e4b5ecf391851d32ba454
-
SHA256
a987537a3eed5febba6fb3d7b560bc7df89d28d2f141dc6d0350fc67f603fc0f
-
SHA512
baebaa89bba8632c66af75fffb2019c3dfacbfcf468204e042ea56efcf8907eff9dc3d801940d281b67b1a1438c37c67bc57aff55a091a6300b98a1762171911
-
SSDEEP
24576:wmWWuTOO8IxotLM+ogF0Ix7y9JqH7bZhwn6zu63yo:wmiEMijHxUqXZTj
Static task
static1
Behavioral task
behavioral1
Sample
swift.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
swift.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://djanic.duckdns.org/fashion/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
swift.exe
-
Size
1.0MB
-
MD5
1eeb57c0877a06d18aa028e87d5158b4
-
SHA1
d086921faba08c2600d862b680b70a53a3bfb88e
-
SHA256
d8c8496ad93779966bb498f8749bae4b6cdf2e1bd46c75a341e81a19fefde4a3
-
SHA512
16303c9bcedbfe4c5d6c953e39a98014d7f355e1c6413f960094840fb9e7f581832cc54a0557cc81e3e212f48c82d6897bcbaa4bc3fdecb72043757349f153b1
-
SSDEEP
24576:zglru6TUwOFJqxotNMKoGAIp7WfJ8H7bDdwb6ju63uNF+:cSva65pE8XDVaNw
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-