General
-
Target
58ce4801b1cce8b7dea3984a356eac9522d4bca024365248b51b65a4b37a2e1e
-
Size
233KB
-
Sample
220724-g8lvasafe7
-
MD5
b76737f518282c3073d2631cce62d08d
-
SHA1
ad62353e30d4563f3563b1f00e90231c069a0719
-
SHA256
58ce4801b1cce8b7dea3984a356eac9522d4bca024365248b51b65a4b37a2e1e
-
SHA512
961e2115a44a13b89787c8c3e69df74d64c579264e7bd13f1fbd38e679d9f525039400985e7d7eb8d86900edcd0885bd4a8ca02b088e25fe100644e5ffa26ffc
Static task
static1
Behavioral task
behavioral1
Sample
58ce4801b1cce8b7dea3984a356eac9522d4bca024365248b51b65a4b37a2e1e.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
58ce4801b1cce8b7dea3984a356eac9522d4bca024365248b51b65a4b37a2e1e.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
lokibot
http://ipv10.duckdns.org:6060/adam/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
58ce4801b1cce8b7dea3984a356eac9522d4bca024365248b51b65a4b37a2e1e
-
Size
233KB
-
MD5
b76737f518282c3073d2631cce62d08d
-
SHA1
ad62353e30d4563f3563b1f00e90231c069a0719
-
SHA256
58ce4801b1cce8b7dea3984a356eac9522d4bca024365248b51b65a4b37a2e1e
-
SHA512
961e2115a44a13b89787c8c3e69df74d64c579264e7bd13f1fbd38e679d9f525039400985e7d7eb8d86900edcd0885bd4a8ca02b088e25fe100644e5ffa26ffc
Score10/10-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-