General
-
Target
Product Inquiry.exe
-
Size
697KB
-
Sample
220920-wxk6ysebd7
-
MD5
9386b02948f329122dbbcd33a330db4e
-
SHA1
19dbc46e6d3a7db51b059d095a4fe8783759d6a8
-
SHA256
95dd34de2f6e73d6042f299af673d33a26684a26ed42e4bfe24ca71f80cb38c0
-
SHA512
373ba2c03581737968ded508e2399cea02a1ab8c9dee21c5575cc9130dd5133b0fab5aeb649ab2b2e4668f4922dbedf2ce7502f516e8a79dd77fd3fe18eb4668
-
SSDEEP
6144:GlkrZZJah/9RI3GyutKeYz1ls0jgyOULjhylTEbcZxkaI6RTAPvgOsUNb50WGcwf:IkrZCFqes/zzAyb0karevvnNbxGcw
Static task
static1
Behavioral task
behavioral1
Sample
Product Inquiry.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Product Inquiry.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
http://162.0.223.13/?loop
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Product Inquiry.exe
-
Size
697KB
-
MD5
9386b02948f329122dbbcd33a330db4e
-
SHA1
19dbc46e6d3a7db51b059d095a4fe8783759d6a8
-
SHA256
95dd34de2f6e73d6042f299af673d33a26684a26ed42e4bfe24ca71f80cb38c0
-
SHA512
373ba2c03581737968ded508e2399cea02a1ab8c9dee21c5575cc9130dd5133b0fab5aeb649ab2b2e4668f4922dbedf2ce7502f516e8a79dd77fd3fe18eb4668
-
SSDEEP
6144:GlkrZZJah/9RI3GyutKeYz1ls0jgyOULjhylTEbcZxkaI6RTAPvgOsUNb50WGcwf:IkrZCFqes/zzAyb0karevvnNbxGcw
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-