General
-
Target
PO_60577.scr
-
Size
1.1MB
-
Sample
210113-rb74cfjf72
-
MD5
000af790102eb884cfb98b2e4cf50d5a
-
SHA1
aaa6182f2db7d3608e131f5badf612c7e4ab3377
-
SHA256
c75e2b1752bd8221bd68fea21243915af2a92834a23d148a46e41b370badfd18
-
SHA512
3693c63e07eb23185a7bf8d64a25f4128e13e20441827319db6f3f6a320f6472ba494b60cb69be8c5fbb7c634d0af90c671248632df852408faf5d76b10d72c7
Static task
static1
Behavioral task
behavioral1
Sample
PO_60577.scr
Resource
win7v20201028
Behavioral task
behavioral2
Sample
PO_60577.scr
Resource
win10v20201028
Malware Config
Extracted
lokibot
http://185.206.215.56/r-1/cgi.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
PO_60577.scr
-
Size
1.1MB
-
MD5
000af790102eb884cfb98b2e4cf50d5a
-
SHA1
aaa6182f2db7d3608e131f5badf612c7e4ab3377
-
SHA256
c75e2b1752bd8221bd68fea21243915af2a92834a23d148a46e41b370badfd18
-
SHA512
3693c63e07eb23185a7bf8d64a25f4128e13e20441827319db6f3f6a320f6472ba494b60cb69be8c5fbb7c634d0af90c671248632df852408faf5d76b10d72c7
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-