General
-
Target
024d9f82d306df06bb3a9c5ef6122c6e
-
Size
671KB
-
Sample
221004-xz7cmsbhg9
-
MD5
024d9f82d306df06bb3a9c5ef6122c6e
-
SHA1
36b04ac1e1f27803cba24559bbf0ead79f599534
-
SHA256
7cb46508d7a72ceaf60eafc5f9c3166d1329aa8e9a3a9e14e7cf5952edbf2a6b
-
SHA512
5d692ea2470c1b337c7e285dc5cb655a5f16c4f8196ad746e7afecb80ac909778e96ef5d6937e9e9a83155735f3f70183108b5afde5ad191c43523d96bab3ae4
-
SSDEEP
12288:iePoPQ77KVUAeDXvU5wtCf3OyxezE/ao4vi7rsq5OkX8Zlra9VOzo:iepDD4xYAaQ7DOkilrEVx
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order no#100894.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Purchase Order no#100894.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
http://162.0.223.13/?05315
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Purchase Order no#100894.exe
-
Size
949KB
-
MD5
33a0fb90d362ed8d3a4ecd8d4ef6ecff
-
SHA1
adaf7e746f89a370a6053588d996973efd7e9450
-
SHA256
3462fa9634ad9ada7c6d07f2b48138fba9326e4771843da8a11a33bb618f265a
-
SHA512
ae48efcec02c363d79b7b124b81c9339e1468117208de72ad280706e8df3fb7f12af0174f84da0165bd54ef6aaf07ff7871c6a8ef7dd2aeaeeabed7c6e0475d4
-
SSDEEP
12288:cHK4HTNqNPt9WW3fYPcc94HFUOAA9j/sMeGlZUOF4g:BP3fYPcc9iHAisol73
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-