General
-
Target
ef8bef7d1a8ae3ba7e8eb587d183c880_JaffaCakes118
-
Size
407KB
-
Sample
240921-lytjlsweka
-
MD5
ef8bef7d1a8ae3ba7e8eb587d183c880
-
SHA1
2dc7f3f967fd5616b866f7659cc5f748668a62cd
-
SHA256
4f6a14fdfe1ed27721d7e8d09e9524240f912b85a29bc6ba76f6c60508b1e09c
-
SHA512
5d8c5ed789c58699e7bcde0b8234193b733a415bc2a9bea7419239f120446303f969f4f08efcf8f814bbab000a9d9a542bf3d0ce8c10924d450344de5dbc4670
-
SSDEEP
6144:x8I0ys1egkLahZpu7LpOSQvHPFrC+2F7h+D6/OuA5qR5E6KSpb6odrF9skA8r+R:x8I0ysYdLahIlavHN+57QC53+kA68
Static task
static1
Behavioral task
behavioral1
Sample
MV Medi Aero IMO NO 9708966 00877 -xlxs.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MV Medi Aero IMO NO 9708966 00877 -xlxs.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://hfktichen.com/kaka/kaka4/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
MV Medi Aero IMO NO 9708966 00877 -xlxs.exe
-
Size
434KB
-
MD5
fe42b52214d984619bf7c42d73bc7980
-
SHA1
4dd5052bbfcb6d37a636decae1d8bc03f5c355a7
-
SHA256
98a050f19567bb930538a9656904f62036a9bee4f3f08c24463d6777cd87eabf
-
SHA512
1f1ddf27221adff8884c239c85c35e8c1d2a0acefe7569bb4a1f7fa1815e37c095b5108a4fed08f465a99e593eaa8d0883af2946c4f531a57d5203f5ccc296d6
-
SSDEEP
12288:sYKYjP6eP97rBuR0IXXp2ExYu3fOzVaoXXl8EkZO:d3jP6+7ronpJr3fQVNn
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-