General
-
Target
ef4761cd6a71054b43acad6d713d7abb_JaffaCakes118
-
Size
1.8MB
-
Sample
240921-hrx2nszfln
-
MD5
ef4761cd6a71054b43acad6d713d7abb
-
SHA1
ce962259fe5826ad17ac0fc7c98eccb811f9ce5d
-
SHA256
fe974b02ead7c2e466973a042c8fa4a9779afdae0810ca538e6207465d470f3b
-
SHA512
ac908867c86957411dfe3f138ffa26951b2684e0ac47a5e2f4c607a72305bb2581b4342f58820ee3ebc83a35df4c9a3a66542dc0e774c92882bc02bc9262017b
-
SSDEEP
24576:NRgV9lX4ePztJzKe4QTnExJrP61c5sY1HVHTJxolLkXtVDJDhuecA7PGEWOrT4G/:NR6bbJR7Oyu5sw1NeLut/MAyVOr6k
Static task
static1
Behavioral task
behavioral1
Sample
Extract_MK22AXX_SWIFT_98_2020.09.23.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Extract_MK22AXX_SWIFT_98_2020.09.23.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://pkiz.xyz/V3/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Extract_MK22AXX_SWIFT_98_2020.09.23.exe
-
Size
1.8MB
-
MD5
ccf8a20a1000a59693c36654ba595f7e
-
SHA1
8f3f084c7f523af56769379f4529bb693c227863
-
SHA256
7513ca9ae16b3dab78a70cd6c5ff6c58a3107256387a1db597e1c7945037e17b
-
SHA512
696349aff3658e669cb44a1879d755109d2c9750c71505ace2bbd0ad383548f74fd11b7c0e83ea1984bd9b5e4b3082b50fed3f06fe3a2a5c0869a3e064b64dcc
-
SSDEEP
24576:3RgV9lX4ePztJzKe4QTnExJrP61c5sY1HVHTJxolLkXtVDJDhuecA7PGEWOrT4Gr:3R6bbJR7Oyu5sw1NeLut/MAyVOr6kD
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-