General
-
Target
ca7d12f0f62f362a2f13d842215e89bf_JaffaCakes118
-
Size
437KB
-
Sample
240830-kbzlnsvand
-
MD5
ca7d12f0f62f362a2f13d842215e89bf
-
SHA1
b062f27d2510ca0474a948d21dfd13e67377f099
-
SHA256
22da2a400a6f29eb10d052dee6b845a4773872b6c57f481d3f3b2c224f67bba8
-
SHA512
b496b19424ec17b1198acb84e1b3a6e10a1785276124a33acaaba9ebf73d873f62e2a598ce9811fb04b1dcc4f9bb4981b0c1fbfdd9d8f8889f0556a850b9d3da
-
SSDEEP
12288:9p/EFf0Mhyx1Ze0rSXSJhosDsXDP+yUbY6iXhhPEb:n/4cMMve0OX0osDyDP+QPa
Behavioral task
behavioral1
Sample
Order-Specification.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Order-Specification.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://odontologiaintegra.com.br/wp-admin/crest/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Order-Specification.exe
-
Size
603KB
-
MD5
e14ec32eb50425fa5b145056cf82c261
-
SHA1
0cb0d683950f723fc60f85cdbc5eb8cd6945ca00
-
SHA256
31fd4700bb6f2af8f9102e59918b4d52e7208449f5c714c595f935f1d21680b2
-
SHA512
d33ce8c2f23ba917d9aeb8b7fef03e6ddf6f849793b85e26455f727a2b3f29e4ec675d6f4505eba8fc9aa3793c287d60154921a9062b7dd33c75d3604ceaaafd
-
SSDEEP
12288:nbLS1yVho5ba7Ztpt5Pcd1g1q2ESRIStx92qf:bLS1yVyItpty1gBEol
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
ModiLoader Second Stage
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1