General
-
Target
6618caba6d73150fc10c2e4d2cacf3ce63e86997224b9555b48d3756efeb6d3c
-
Size
176KB
-
Sample
220521-pwvwfagah2
-
MD5
b934e224625eb413ee380000fc6774a3
-
SHA1
c2dbd3ccf0f343e7aafc77aa282a725c852e7910
-
SHA256
6618caba6d73150fc10c2e4d2cacf3ce63e86997224b9555b48d3756efeb6d3c
-
SHA512
4c2749dc6eeadb2b1d9f8ac84f343cf342c39495e00ef7c83d4b5bb97369ad7a2a3239398af1775dc39089cce84427c097ea64080c5375f96ff394dc75c6ae2f
Static task
static1
Behavioral task
behavioral1
Sample
BANK_RECEIPT_PDF.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
BANK_RECEIPT_PDF.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
lokibot
http://beckhoff-th.com/kon/kon1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
BANK_RECEIPT_PDF.exe
-
Size
209KB
-
MD5
13b9d3990d60a56c5659e1bfb63a87c5
-
SHA1
66eaefe211b835712145edd82fea6fceeac4f31e
-
SHA256
d99e015f0b74d50841cb3122a2c84d2ba549667e3018d571d1383fe4ec49ae69
-
SHA512
3742ebd3b9f005b465bf1f44218707e3fadf9fc8574727ba57258688c01c426982149fc9c6334e94b6364adbaf525eb181768fcf4fbd11dea248894b1556586c
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-