General
-
Target
989E2813477A4245E0357E0F8E49AFAE384AF828C95EE.exe
-
Size
379KB
-
Sample
210722-qzcs9a4p72
-
MD5
17ee7ef4673eab6d45037b04cf2c70b3
-
SHA1
eab393fa429087dff64a209d5afdfedeb929e5eb
-
SHA256
989e2813477a4245e0357e0f8e49afae384af828c95eea29c0e56b905d8290fe
-
SHA512
92be0fd0bcdfedd24f2476fb32406b9570a5603f7bcae9dcb6ecfb954b0d121852b7913ffdca682af80c6430893bd0b163a64376ee1c19f20da3bab558ac8ac2
Static task
static1
Behavioral task
behavioral1
Sample
989E2813477A4245E0357E0F8E49AFAE384AF828C95EE.exe
Resource
win7v20210410
Malware Config
Extracted
lokibot
http://exinmbakala.xyz/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
989E2813477A4245E0357E0F8E49AFAE384AF828C95EE.exe
-
Size
379KB
-
MD5
17ee7ef4673eab6d45037b04cf2c70b3
-
SHA1
eab393fa429087dff64a209d5afdfedeb929e5eb
-
SHA256
989e2813477a4245e0357e0f8e49afae384af828c95eea29c0e56b905d8290fe
-
SHA512
92be0fd0bcdfedd24f2476fb32406b9570a5603f7bcae9dcb6ecfb954b0d121852b7913ffdca682af80c6430893bd0b163a64376ee1c19f20da3bab558ac8ac2
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-