General
-
Target
c563b14e64a35861162fe200bc0c03c2_JaffaCakes118
-
Size
270KB
-
Sample
240827-vzshda1hqa
-
MD5
c563b14e64a35861162fe200bc0c03c2
-
SHA1
ae0aaaafa5f96564508d195d6042db6de9156472
-
SHA256
d4d93d4f9418c3780969059d4c1aeae1273324bc6d1e8af74910593fd40659f8
-
SHA512
0cda5fa67530a1a0aff0baad01b2262a2de023cc8cf463037578a6af5bc1bd695821f354fd24ebc85013bc01c4b28d066f2bd5b0db949e9057f005032e4963bd
-
SSDEEP
6144:Kq0/xJqonjkYaScqOMGwckhXcJR1KiYaTu2segHWcbIuDB3TyF5:KNPwadObAhXcJ/7Y52fmMT
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT INV.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
PAYMENT INV.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
https://itweurotech.com/kobane/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
PAYMENT INV.exe
-
Size
590KB
-
MD5
983601521176ceddddf5fc6142e8dbbc
-
SHA1
962c55c211bdec3aa08990207ff80db1a6142b54
-
SHA256
2005a7d48cf7e946fd3687933dceb9b8a06e2235508b4cda4d2e63a558da12fb
-
SHA512
64f2869481460821ff91bd0425b6d47b9ecc15a16cf24883c7bd50cda56879f182168c931a0a928144f370dabadb0f1e73420de3efc6a9f904fec2c56e6f7773
-
SSDEEP
12288:qE5TvcnBI9m5Xq+xQhCE6sP20iyyJc+ou:qqcBI9m5JQhCq+ou
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-