General
-
Target
0cbeff3c063734ee70f108948b716c84951fd0db0d52082701eec3928f1e2bf1
-
Size
211KB
-
Sample
220521-xmmgpsfdcj
-
MD5
5bd253ebe134250f85bd83117676ad70
-
SHA1
7b76aebc7d09e66236e5a76cadf96f2048e08122
-
SHA256
0cbeff3c063734ee70f108948b716c84951fd0db0d52082701eec3928f1e2bf1
-
SHA512
5edb0be3b1f1a7d485ddafc2f28200936c30e24b4a06018f5aecbb8d0c4a176ce94c84360c12722d2d25682be4cc3f05855a58f188ff9980ba5f591b6cb761bc
Static task
static1
Behavioral task
behavioral1
Sample
scan00465.pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
scan00465.pdf.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
lokibot
http://20gharch.ir/catalog/mike/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
scan00465.pdf.exe
-
Size
256KB
-
MD5
5c23fa7ba9d5437af31e65a25e02ebeb
-
SHA1
c4fe673e802437070e42e717166128770db035d8
-
SHA256
6ebe953cbd64c1fc7a97e28bbff6e35881c883a409cbdcbffe540db77f88e6c1
-
SHA512
6f590ca57c70a832f1558533ab0ba7b50550157f98da5f03eccdc9516bf95ab41ab737d73fe8a25c19c9e54fcc7f183d263fb9e29534bc434d3ce38731618dbe
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-