General
-
Target
d12315f2722d80d261f0879ddd7800d897a350d69235a926ffbff5992bb8c50a
-
Size
122KB
-
Sample
221030-v7mxvscah4
-
MD5
3659039a266284440355fbbc2f55550f
-
SHA1
fb970b9132a91ea5eb79b7e77c9c30c438b4023f
-
SHA256
d12315f2722d80d261f0879ddd7800d897a350d69235a926ffbff5992bb8c50a
-
SHA512
5e18c3f265d1b5f303263ba2234cfcc3d44089b550f2cca5c4abe49e5bfb32c2dc5951f80c0f505460ff4d3118b2c6e29ea0988b4a9535ff6a41eba8b708ab23
-
SSDEEP
3072:qUJoFfWzzl+cSM4jPN485i1fgV919wfBMspL5S2Jp:qweEpsPN48CgVpweaL02D
Static task
static1
Behavioral task
behavioral1
Sample
d12315f2722d80d261f0879ddd7800d897a350d69235a926ffbff5992bb8c50a.exe
Resource
win10-20220901-en
Malware Config
Extracted
lokibot
http://208.67.105.162/drostov/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d12315f2722d80d261f0879ddd7800d897a350d69235a926ffbff5992bb8c50a
-
Size
122KB
-
MD5
3659039a266284440355fbbc2f55550f
-
SHA1
fb970b9132a91ea5eb79b7e77c9c30c438b4023f
-
SHA256
d12315f2722d80d261f0879ddd7800d897a350d69235a926ffbff5992bb8c50a
-
SHA512
5e18c3f265d1b5f303263ba2234cfcc3d44089b550f2cca5c4abe49e5bfb32c2dc5951f80c0f505460ff4d3118b2c6e29ea0988b4a9535ff6a41eba8b708ab23
-
SSDEEP
3072:qUJoFfWzzl+cSM4jPN485i1fgV919wfBMspL5S2Jp:qweEpsPN48CgVpweaL02D
Score10/10-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-