General
-
Target
c0e8c3c45c6fe75f64956965aefef295_JaffaCakes118
-
Size
253KB
-
Sample
240825-rggflszdnk
-
MD5
c0e8c3c45c6fe75f64956965aefef295
-
SHA1
af07540efd80a42b2492dc666c8b45646fd92b52
-
SHA256
cffc342e49490e55a368dba2ae0e5124c3d94e199367fce23dbaadcfee51d0fa
-
SHA512
732f8ab1427889eef5434e2f6cd3e542aa2f45eeb28195f622f14fba551ab5b70e5e16dbb0b899e2a68b5f8913fe49833bc59b7bff092d0defa5a46857f0ded3
-
SSDEEP
6144:YwdNXEgmPAvS8H7JEwt7NI5nAWNFPob7PTbR8sMPM/ibqM:YSEgpSCJEa74nVFq7bR8lM6bB
Static task
static1
Behavioral task
behavioral1
Sample
Revised PO#81223 , PDF.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Revised PO#81223 , PDF.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://shungkargo.com/hoist/logs/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Revised PO#81223 , PDF.exe
-
Size
313KB
-
MD5
973007d44df8a46739d13b6946b05495
-
SHA1
dc916bd9de4c19fc353d5efb3113afea0deb6b92
-
SHA256
43f445c8c772ea30a95c69331da3113f550ad3b3e5d5b6d234d8fd8457b38d16
-
SHA512
456de8d86ea0064318d8c4d0eb70b7614520672ad86dbf0f37891ed9dc458c9623b59edc5cfeaf0fe2066ddde2ac50f12ea21b834a497e44fd6e3fa26c683d3f
-
SSDEEP
6144:CFXuNXQQW6LJS5dVNK+4kGzA2WI7NQyJS1LRXXn2b5847:qu66LJSpNNW9WI7GLRXX2n
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-