General
-
Target
ed2705e3dfedb5d874fd07ad4e94d2af_JaffaCakes118
-
Size
44KB
-
Sample
241213-25wkjssnhl
-
MD5
ed2705e3dfedb5d874fd07ad4e94d2af
-
SHA1
1694be2aef8be6bf68567c4103eb7ed617cafd3c
-
SHA256
387ac72f73b8275b1f733db46ee2740f18111942164836250e0885d508841b2d
-
SHA512
559c54ed93271dc4f8aa1e0ed2fd8484ff91976e2e01358ac6bb480adddc89916fe8fca389d378da18a1915674585fcfe88092e123bf487b3acd55ecc52271fd
-
SSDEEP
768:fgHgk0YjD9UhmJQVPutmn4klyoEJJt35+Y1/Ag8FlHm9uVPCA6ezKV+Y76L:fI5gm6Zutmn4tf1ntWv3nHr
Behavioral task
behavioral1
Sample
Banking details for payment.exe
Resource
win7-20241010-en
Malware Config
Extracted
lokibot
http://frembonga.ga/binge/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Banking details for payment.exe
-
Size
104KB
-
MD5
1341ed3853e33133e80ba8ce87ebeebc
-
SHA1
5731e4858eff66a61cb2add852e61293c2ba5331
-
SHA256
dc0c244674ff2d063c77edd72795ce34db8fe4fdd054ce2a7b5018fb34adba4b
-
SHA512
d1ea6c3d55d148844e9681fc31a70d4132fd68e2ed1cd59538fdd28765fcbae01d262f61d931671ae8f89c9c9b611136c5aec7aa4bd8d8806afdf235533ea8a6
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-