General
-
Target
d3e48fa2186bf79f15777b9fdae745a0_JaffaCakes118
-
Size
445KB
-
Sample
240908-jstw3svbpq
-
MD5
d3e48fa2186bf79f15777b9fdae745a0
-
SHA1
cc50f9b20461d68e2d628dfdda47b6bdf8034f32
-
SHA256
567aa66bc6af44cb50df99208bf8475be187b1b2cb5c2dabb45ca13424f86a5f
-
SHA512
68988dd681ad008d51e0018b1a25bd067d22b9afca6c7906acaf5082a0275293317947507fbf0f1e358eb1a5ce5a2ec6cbc0b85512571286017b66e3a349b786
-
SSDEEP
12288:3kuwXCTvUXHMnc0NTNFpoOD6LtoLQCwFlA:3UsXnJJFpHD+iL3wbA
Static task
static1
Behavioral task
behavioral1
Sample
889TeK5yVN72YbS.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
889TeK5yVN72YbS.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
https://duclongetc.com/b/need/work/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
889TeK5yVN72YbS.exe
-
Size
519KB
-
MD5
a82fe3286628c18a13d7101cf4ad9fa5
-
SHA1
2431dcb0b3e8ee2c9c2e83ba97b60e2b436c8080
-
SHA256
9c0ca340482798d9a62a26b8928e2bfcc20aee978a6b948d17d4a2c04c9adb0a
-
SHA512
8fa386a25453469259fa9194c02530686e4087a58a22a5d7035826dcc15a70cd3c0aa0c68396f47c239f25ac915213c5df65ca5cb69776c61c596be54ef6840c
-
SSDEEP
12288:B/iPhHqAkqf6tze5DwtZKFpUpXYD/YSqiAIPwURZM3/u8aj8g:qhKaf6tzfZ+zc
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-