General
-
Target
c6275a810c4c47757120f678960dd316_JaffaCakes118
-
Size
456KB
-
Sample
240828-d5vfgstcja
-
MD5
c6275a810c4c47757120f678960dd316
-
SHA1
557fa7faeaa9acf5e8868c0d12d3af7f84bd1649
-
SHA256
5a9f7e3b5a1afc72ab08deb5890adf9511e53d850e96aafabc9690b97670deb1
-
SHA512
568ab8790d4ca9bea7c663ffaa812bc916cf23709632b2aebe86d80f1249b618813aac063d34cebfa742d2bab5f0a2477d70be13c9613242cffbb40c297580f9
-
SSDEEP
12288:I5B4W9Q1WXfRJaBMkd08GCsn9Cho/exoBaGLZzq:MuWq4RJwMkdjZRcex7+I
Static task
static1
Behavioral task
behavioral1
Sample
ar31Dwi59D2H6pJ.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ar31Dwi59D2H6pJ.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://51.195.53.221/p.php/2dY9AG7m0LNWP
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
ar31Dwi59D2H6pJ.exe
-
Size
578KB
-
MD5
a6a08f8fcde6a367cc1b75d30d2e62d9
-
SHA1
5ba16a4497a8a5e966010dbd6d43e22a2d172de1
-
SHA256
9e63e95fabac033f8be11d628367fc4b46c8fe54e2a2a50c6968815be3812569
-
SHA512
d203f3a653a1fa671e5933334cebdbfbd1cee69ab77785890cd09718d31277b8fb36f3b98fa2b200695fe35c7b43abe45cd1032dd8c96373abfd219a8a5d6f55
-
SSDEEP
12288:Lh5m6o3/OAc8L28zGcTFPGIKZDaGBzAOzVrwgaU8fYUot0:LpfAc86oGeYPZDaGB0
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-