General
-
Target
5acf23f0835e6330dff92f9e57225d3540aa333cde58e3044b926dcc6929cd53
-
Size
212KB
-
Sample
220802-cm59laeef7
-
MD5
8dde6ae8991612c769a66608dd50fe8f
-
SHA1
acff562f6e60abf3cfb0dccc2097bc0576bade70
-
SHA256
5acf23f0835e6330dff92f9e57225d3540aa333cde58e3044b926dcc6929cd53
-
SHA512
4ce90dd6899fc311523bbf0c00676a2456a6b888287bb33278aac567348718d808ae52392b7a12506de2dca24e9cc94ab73c02e514c1282e8e2f974c10f93387
Static task
static1
Behavioral task
behavioral1
Sample
5acf23f0835e6330dff92f9e57225d3540aa333cde58e3044b926dcc6929cd53.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5acf23f0835e6330dff92f9e57225d3540aa333cde58e3044b926dcc6929cd53.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
lokibot
http://ipvhost.duckdns.org:6060/host/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
5acf23f0835e6330dff92f9e57225d3540aa333cde58e3044b926dcc6929cd53
-
Size
212KB
-
MD5
8dde6ae8991612c769a66608dd50fe8f
-
SHA1
acff562f6e60abf3cfb0dccc2097bc0576bade70
-
SHA256
5acf23f0835e6330dff92f9e57225d3540aa333cde58e3044b926dcc6929cd53
-
SHA512
4ce90dd6899fc311523bbf0c00676a2456a6b888287bb33278aac567348718d808ae52392b7a12506de2dca24e9cc94ab73c02e514c1282e8e2f974c10f93387
Score10/10-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-