General
-
Target
bd54ba15b12f9e0b4580904e572961e1_JaffaCakes118
-
Size
1.2MB
-
Sample
241203-pbdresvkhs
-
MD5
bd54ba15b12f9e0b4580904e572961e1
-
SHA1
45c591031e5b2b0bb0a1befb528bf7374f6f1fc5
-
SHA256
0e5e7fc59e145c465ef13b673c34010fcd51325d9b05ba56f5ebadb450ea3bd0
-
SHA512
8c9a9f5a800280fe8a24985096f35a88036a11c64059fdf3a6dfae37fa85a3b6db9c72e2c84deebac136848bcb9f35c3c5da5d480dcea4b398ca2ea648f2b53e
-
SSDEEP
24576:VWnczSW8xUQFZnFlf/T54X+1JH/kYG1zFg4CyFV05ZOLaJ/5p:V8czSW2xjf/TI+rGpf05gaJ/r
Static task
static1
Behavioral task
behavioral1
Sample
SCAN_2020305_14384990.scr
Resource
win7-20241010-en
Malware Config
Extracted
lokibot
http://eaglemechine.com/adm/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
SCAN_2020305_14384990.scr
-
Size
1.7MB
-
MD5
730917b9f9972445ca54b505c853de95
-
SHA1
fa6286e202ef441b03c4434e6087c65ba6aa4e2a
-
SHA256
85372ad7e7596961332805ed270036aa63a776482f46e143c301921bbcaed95e
-
SHA512
0874f6f9759cdcf389dc5f642e9cbff11d3dcc6e7172bdd13a964eaf32950f0670e797c350b4cccb34ce892ee823bf20fe6fd5f43288bc924ac2e72ac4c0ec07
-
SSDEEP
24576:4tb20pkaCqT5TBWgNQ7aMSMfCxqn/+TkavB2EgRLBFlvEp4MlI6A:BVg5tQ7aMRCkmT3Bpg3PvEE5
-
Lokibot family
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-