General
-
Target
44cb03a0be06167da6d70e6271f37c39e346a8ee16eecc0040c01221bc1d02a0
-
Size
1.2MB
-
Sample
220707-wr9x5aecen
-
MD5
4fad11d68404c14f0927a0b1a3b2b4bb
-
SHA1
c7d7c8dea4e6b97f29789299262dcdc3ddbb311a
-
SHA256
44cb03a0be06167da6d70e6271f37c39e346a8ee16eecc0040c01221bc1d02a0
-
SHA512
6c0e1fb4e13b1bc2d917483f8e8c7e17aac3dcec2271b1ac6a0b034d00a4671ae68947a81ee65779a7457c5263b639b414d1f348ce10a11465b5aa18501aa5d8
Static task
static1
Behavioral task
behavioral1
Sample
44cb03a0be06167da6d70e6271f37c39e346a8ee16eecc0040c01221bc1d02a0.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
44cb03a0be06167da6d70e6271f37c39e346a8ee16eecc0040c01221bc1d02a0.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
lokibot
http://begurtyut.info/hero/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
44cb03a0be06167da6d70e6271f37c39e346a8ee16eecc0040c01221bc1d02a0
-
Size
1.2MB
-
MD5
4fad11d68404c14f0927a0b1a3b2b4bb
-
SHA1
c7d7c8dea4e6b97f29789299262dcdc3ddbb311a
-
SHA256
44cb03a0be06167da6d70e6271f37c39e346a8ee16eecc0040c01221bc1d02a0
-
SHA512
6c0e1fb4e13b1bc2d917483f8e8c7e17aac3dcec2271b1ac6a0b034d00a4671ae68947a81ee65779a7457c5263b639b414d1f348ce10a11465b5aa18501aa5d8
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-