General
-
Target
e14c0a5111004734fe2d39162c2164a7b3916011209be8cc4c30d823ac193a11
-
Size
260KB
-
Sample
220520-3nplcacbcm
-
MD5
9b010e555b9ef6a5bd4b7c1332cd21a9
-
SHA1
e8a4bf28b166642dd92eceb1d5c446af102750fd
-
SHA256
e14c0a5111004734fe2d39162c2164a7b3916011209be8cc4c30d823ac193a11
-
SHA512
f0429df4637ff42e8242e192ec7f52e35b186e63be62a38c83a05bdb373b1ede2047a1f900d1f067dc7d8713a78197c9b32b7c5bc4fcf52527d3109f33bfa7a7
Static task
static1
Behavioral task
behavioral1
Sample
PO.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PO.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
lokibot
http://79.124.8.8/plesk-site-preview/krockabread.com/http/79.124.8.8/smik/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
PO.exe
-
Size
359KB
-
MD5
2eb37ab18bb1a92b38cdf58b02882197
-
SHA1
ec7a0142286c0130ff1710da4c868e7db4bd55bf
-
SHA256
57d86d719f126ab791a63997ed510dec77649924b2e47d54b73ed3641b56678f
-
SHA512
15b3c864a9d95817638bcae323c773e886d0c7cc4236abdd9fd9a2614ed7b886f073499997ffa83ebbc6ce5d14b011d78ee365b3f22dead9b288c9130132b025
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-