General
-
Target
file.exe
-
Size
122KB
-
Sample
221030-zg2qjsahgj
-
MD5
04d5fd1eee4086db7f843c8306c48db3
-
SHA1
8d3eef0f55a54eb73e461f3917d6da7e43063270
-
SHA256
85fb1682833c86f92b228b644d72fab46f888acdaeec26b8f7a4500a5635aab5
-
SHA512
53b9c40ca539258391c2caf80688a1ec0702c1ecd25b5ce8657694114654b4fd65a1c5d0d5e5aba225b8923d7a386a745bf364d7b75fe649044124184a6a19f6
-
SSDEEP
3072:qUJoFfWzzl+cSMDAuXff6xUFl4NYuP0DlWgx2zMQm+GQFGoU:qweEpDAA949P0DlEPDS
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
http://171.22.30.147/rostov/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
file.exe
-
Size
122KB
-
MD5
04d5fd1eee4086db7f843c8306c48db3
-
SHA1
8d3eef0f55a54eb73e461f3917d6da7e43063270
-
SHA256
85fb1682833c86f92b228b644d72fab46f888acdaeec26b8f7a4500a5635aab5
-
SHA512
53b9c40ca539258391c2caf80688a1ec0702c1ecd25b5ce8657694114654b4fd65a1c5d0d5e5aba225b8923d7a386a745bf364d7b75fe649044124184a6a19f6
-
SSDEEP
3072:qUJoFfWzzl+cSMDAuXff6xUFl4NYuP0DlWgx2zMQm+GQFGoU:qweEpDAA949P0DlEPDS
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-