General
-
Target
4383de80c7bd78d1e35e3d5a0d92a8edf079362a6503894c9be4735a5bb21716
-
Size
545KB
-
Sample
220707-2ks9paehem
-
MD5
3cad7ef8cd70c33e6e7e383301fbf4a1
-
SHA1
c2d3575588b565b1406bcf6dcaeac7ca3ddebc00
-
SHA256
4383de80c7bd78d1e35e3d5a0d92a8edf079362a6503894c9be4735a5bb21716
-
SHA512
304dc5566ba0f81e3da65d0d2d7ecc842981c48180137fc6079cd0240955871b7eeb815e033574ecd96c813b42066de124193bc7aaa1351641ff9a2e04121444
Static task
static1
Behavioral task
behavioral1
Sample
4383de80c7bd78d1e35e3d5a0d92a8edf079362a6503894c9be4735a5bb21716.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4383de80c7bd78d1e35e3d5a0d92a8edf079362a6503894c9be4735a5bb21716.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
lokibot
http://parkrosegroup.info/lewy/sun/ernest/solar/gem/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
4383de80c7bd78d1e35e3d5a0d92a8edf079362a6503894c9be4735a5bb21716
-
Size
545KB
-
MD5
3cad7ef8cd70c33e6e7e383301fbf4a1
-
SHA1
c2d3575588b565b1406bcf6dcaeac7ca3ddebc00
-
SHA256
4383de80c7bd78d1e35e3d5a0d92a8edf079362a6503894c9be4735a5bb21716
-
SHA512
304dc5566ba0f81e3da65d0d2d7ecc842981c48180137fc6079cd0240955871b7eeb815e033574ecd96c813b42066de124193bc7aaa1351641ff9a2e04121444
Score10/10-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-