General
-
Target
d5c14755ab1a260c050bb032aea779e3_JaffaCakes118
-
Size
305KB
-
Sample
240909-gqfwbsxcnh
-
MD5
d5c14755ab1a260c050bb032aea779e3
-
SHA1
2b7c44b92d3bf9c624735f36779d85fa288c4c95
-
SHA256
ec4692078fd68aa0cca67a1d8715fdc29c2577b3df083f77f04370b4f67317cb
-
SHA512
a1e9eb668e0bb14a7bce85f51f32b86ef33a810496bc080eea32b7a9961e17b92ac5d06343045c8fce57f80522908f7e108d2aebcb02a18453669901b223aa18
-
SSDEEP
6144:zViUoQOgcsNLVK26SkSId67nEBbho9IuZyUu9kSW0X5sJxJ2Zxe:ZomcWVnjE09IsPu9dJcn2Zxe
Static task
static1
Behavioral task
behavioral1
Sample
000005067_04977188.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
000005067_04977188.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://195.69.140.147/.op/cr.php/b8ZlD3atg0TYU
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
000005067_04977188.exe
-
Size
563KB
-
MD5
d0a302425fa89ea4a42caccaba7cd84e
-
SHA1
ec4bdd62e04932ef5d1942ec33ef97a9d7848833
-
SHA256
8a0795afe89fe36a1ee16af973575015106814aa2e4421050f9ec1fca3be9887
-
SHA512
ea95b07d25e817e6d28b5cc9fd20ea81f351bc790a94a50fc2226f0e0b34f1fe5d752f087bab25ff3d7f7b29596f0866945b3a7d6e36d00f60fb26e7ee720844
-
SSDEEP
6144:Np3UqQO+cs9L3K26Sk0IdU7nEnbhgvSuZJHgiWpiADnLhwDckjQI1mnKiN:NjAcU3nHEivSsJHgrpiADyckjQc
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-