General
-
Target
b830be1999415537b8fd405406ae38ae50372e19b676608879edc68aba790da0
-
Size
987KB
-
Sample
220521-w9akzseeap
-
MD5
d2e6be26a0f1677fa83a68628153b87b
-
SHA1
7867694d26e4b4917d8aa3b650d57bcc5282f5ce
-
SHA256
b830be1999415537b8fd405406ae38ae50372e19b676608879edc68aba790da0
-
SHA512
cf9be3dbba58aee19832969d7c16896a2391121482ab4b1d02e57cd2c9b7dd37150691cc3ce5ee743a067b6369b6940698da8c7023cbcc86104c8d7142e35224
Static task
static1
Behavioral task
behavioral1
Sample
BUSINESS NOTIFICATION ON COVID-19 CORONAVIRUS DOCUMET_pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
BUSINESS NOTIFICATION ON COVID-19 CORONAVIRUS DOCUMET_pdf.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
lokibot
http://attlogistics-vn.com/first/chief2/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
BUSINESS NOTIFICATION ON COVID-19 CORONAVIRUS DOCUMET_pdf.exe
-
Size
1.4MB
-
MD5
f0934645e28ba2ad506552a7deb3cdee
-
SHA1
2ce2ee7c70c0ce59acd83d3370212457b1d325f1
-
SHA256
9e26d68332abb02fb2e80a924f83eb8614afe4e8b841f51c9f82fd0c986d4571
-
SHA512
c5135956da217b6e6cdcd8bc1b9a011b298c05a10088527aa096732f1ebc6ad2c30a0d97102de26dc8dc30852ed392a79018993f9232a36fce894ed067419966
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-