General
-
Target
57525553f478e9944c206ceae332247dd9c45adab024d1e4a19b52cf124a01b3
-
Size
256KB
-
Sample
221122-lr1dkshc24
-
MD5
7826a79492c0378c3e69a18eadbeb67d
-
SHA1
28b19fb0612ff0679f6c49a3113a4ca542904626
-
SHA256
57525553f478e9944c206ceae332247dd9c45adab024d1e4a19b52cf124a01b3
-
SHA512
fd2ebcae2f1aa1cae396c31dc0c7d2c0e3c15c942588a7c0483ebcfc0fdd8f644831339a95e294a253f05a35e272e9d60bec841f30fd910a954349a32a070c5a
-
SSDEEP
6144:4weEWT44R2GZzuj7Fko78xZEg6Nfshbw4bxarkRaQ8lQQNlLfUx+:sXJbgrzGQN1fUM
Static task
static1
Behavioral task
behavioral1
Sample
57525553f478e9944c206ceae332247dd9c45adab024d1e4a19b52cf124a01b3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
57525553f478e9944c206ceae332247dd9c45adab024d1e4a19b52cf124a01b3.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
lokibot
http://208.67.105.161/starmoney/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
57525553f478e9944c206ceae332247dd9c45adab024d1e4a19b52cf124a01b3
-
Size
256KB
-
MD5
7826a79492c0378c3e69a18eadbeb67d
-
SHA1
28b19fb0612ff0679f6c49a3113a4ca542904626
-
SHA256
57525553f478e9944c206ceae332247dd9c45adab024d1e4a19b52cf124a01b3
-
SHA512
fd2ebcae2f1aa1cae396c31dc0c7d2c0e3c15c942588a7c0483ebcfc0fdd8f644831339a95e294a253f05a35e272e9d60bec841f30fd910a954349a32a070c5a
-
SSDEEP
6144:4weEWT44R2GZzuj7Fko78xZEg6Nfshbw4bxarkRaQ8lQQNlLfUx+:sXJbgrzGQN1fUM
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-