General
-
Target
cfd67cb1024bd319d2b796f5bcf797b8_JaffaCakes118
-
Size
336KB
-
Sample
240906-srdyxatckl
-
MD5
cfd67cb1024bd319d2b796f5bcf797b8
-
SHA1
5407c55640fa513e5d12c1c6c24ab70ff70df9d3
-
SHA256
640eda196b67a6222585e599e35ae69042b3d2e8128e4b115a2670b6249b8412
-
SHA512
dbbf33c7e7de077a2e29c2e0808aa8b51cdfd63f452c586bb5e8456bad7aa2d3f2efb9f27ba6a67625b5f3a7afd0488afd7d29d70f971adc561e0bbf9061b75e
-
SSDEEP
6144:fEvxM0+13uXHGg5aTeWp6PyUMz9RARogjq1JWuf7JjuPZqe3/MM6bvS:sviN13uXb5GeW3z9em1JJ5EjMM6O
Static task
static1
Behavioral task
behavioral1
Sample
invoice.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
invoice.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://casafacilsj.com.br/fc/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
invoice.exe
-
Size
685KB
-
MD5
80bd19737639a4c0b961d4ec63982b9c
-
SHA1
3f978eb8c0f255dd69ce34b722ef76a2ed665684
-
SHA256
b1461b8757b501821aa3d3febe40b768a68a603b78db723b055bffc5f7566b5c
-
SHA512
2f3a665c0d6338dad316645af6e3016843fd432c42c23c03f74f207de5e9fedb0032af3683927b105c8ca7c2d71e2ad52ffeb62caf915a016ae27acb56a809b1
-
SSDEEP
6144:pSFMxo0+17uzHGg5oT4M56PysMz9R2RoyjqXJWujJJjiPtqe3grjv:pSyqN17uzb5I4Mzz9gSXJD5oo
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-