General
-
Target
74a1b1e2cc24b483f6f1678e6da34682.exe
-
Size
964KB
-
Sample
211207-jtvvrsbbf6
-
MD5
74a1b1e2cc24b483f6f1678e6da34682
-
SHA1
99e21666eb2332ca94d2abf13646ef20bfc74f46
-
SHA256
650906c59a17fc343cc1ecdee10567c37b48063d3a476f76da261befa0667da7
-
SHA512
a71990532bbabef6501ee9bf1564e42333975ca77601d01d7cfbc7b224499d524c3ad4387fe4c1aeed56a46f5c8fac8c5311751460bed4e4788ae5c7ea027bc3
Static task
static1
Behavioral task
behavioral1
Sample
74a1b1e2cc24b483f6f1678e6da34682.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
74a1b1e2cc24b483f6f1678e6da34682.exe
Resource
win10-en-20211104
Malware Config
Extracted
lokibot
http://secure01-redirect.net/gb11/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
74a1b1e2cc24b483f6f1678e6da34682.exe
-
Size
964KB
-
MD5
74a1b1e2cc24b483f6f1678e6da34682
-
SHA1
99e21666eb2332ca94d2abf13646ef20bfc74f46
-
SHA256
650906c59a17fc343cc1ecdee10567c37b48063d3a476f76da261befa0667da7
-
SHA512
a71990532bbabef6501ee9bf1564e42333975ca77601d01d7cfbc7b224499d524c3ad4387fe4c1aeed56a46f5c8fac8c5311751460bed4e4788ae5c7ea027bc3
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-