General
-
Target
fee0780cf99da7110b447206c6ab6a3edd658fc2c004c876b22d8194594265f4.exe
-
Size
664KB
-
Sample
211201-wnt3hahgd6
-
MD5
b24c429ee0694dca6112612cb527f9b8
-
SHA1
b3cdd9f596f41c32a89e7e4aa0fcc2f653232058
-
SHA256
fee0780cf99da7110b447206c6ab6a3edd658fc2c004c876b22d8194594265f4
-
SHA512
4b6c2212966be767b4974b9cb6d6c53bef9ee20ecc7a42a5bf9f7251e3f32dfed9d35498ea0d1e601083aea77b26c9f50beacd1ba9b75fb8dbe60b816793f8e4
Static task
static1
Behavioral task
behavioral1
Sample
fee0780cf99da7110b447206c6ab6a3edd658fc2c004c876b22d8194594265f4.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
fee0780cf99da7110b447206c6ab6a3edd658fc2c004c876b22d8194594265f4.exe
Resource
win10-en-20211104
Malware Config
Extracted
lokibot
http://sudais.com.pk/oo/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
fee0780cf99da7110b447206c6ab6a3edd658fc2c004c876b22d8194594265f4.exe
-
Size
664KB
-
MD5
b24c429ee0694dca6112612cb527f9b8
-
SHA1
b3cdd9f596f41c32a89e7e4aa0fcc2f653232058
-
SHA256
fee0780cf99da7110b447206c6ab6a3edd658fc2c004c876b22d8194594265f4
-
SHA512
4b6c2212966be767b4974b9cb6d6c53bef9ee20ecc7a42a5bf9f7251e3f32dfed9d35498ea0d1e601083aea77b26c9f50beacd1ba9b75fb8dbe60b816793f8e4
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-