General
-
Target
4534a730bda79047c7acddbfd145a16656ddfe456970bb3612201c7d20170853
-
Size
391KB
-
Sample
220707-t4dpcadcd6
-
MD5
1c81ccd5f63e8c0e7badba42e914986a
-
SHA1
2bb31c1b75d1783a159ba1c2c988e2714d7e408d
-
SHA256
4534a730bda79047c7acddbfd145a16656ddfe456970bb3612201c7d20170853
-
SHA512
96bdbd7268cb6ffd6d1a6c0576b45f263cd153a30306071e57f9460b891086fb9538ff63428e90ad27b93cd17326d661253905840002c90c0d95f2714e81cfa7
Static task
static1
Behavioral task
behavioral1
Sample
4534a730bda79047c7acddbfd145a16656ddfe456970bb3612201c7d20170853.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4534a730bda79047c7acddbfd145a16656ddfe456970bb3612201c7d20170853.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
lokibot
http://parkrosegroup.info/lewy/sun/ernest/solar/gem/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
4534a730bda79047c7acddbfd145a16656ddfe456970bb3612201c7d20170853
-
Size
391KB
-
MD5
1c81ccd5f63e8c0e7badba42e914986a
-
SHA1
2bb31c1b75d1783a159ba1c2c988e2714d7e408d
-
SHA256
4534a730bda79047c7acddbfd145a16656ddfe456970bb3612201c7d20170853
-
SHA512
96bdbd7268cb6ffd6d1a6c0576b45f263cd153a30306071e57f9460b891086fb9538ff63428e90ad27b93cd17326d661253905840002c90c0d95f2714e81cfa7
Score10/10-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-