General
-
Target
4f3f8153b0841789234621447e7cdf6754b4d8494482853304a849d1ef2c0d89
-
Size
386KB
-
Sample
230104-axxn4add48
-
MD5
6ebb467dc49dbb2b90517da19cfb6c16
-
SHA1
0c3af6a618a75e73920c9872e50286eb987d6e79
-
SHA256
4f3f8153b0841789234621447e7cdf6754b4d8494482853304a849d1ef2c0d89
-
SHA512
3da116117767398befbd862294fbea6bb4d15eb21d8d6072722c8b7d80488b3f2668d3026d2d16bed9d669298b5c6e14c1d23f257729d50d6bd79931c2743637
-
SSDEEP
12288:1Y4UOpgCsQQjEyTpK/ucJKXH8HvuvJq4JI:1YF8gCbUQ/ucJKXXJq4JI
Static task
static1
Behavioral task
behavioral1
Sample
4f3f8153b0841789234621447e7cdf6754b4d8494482853304a849d1ef2c0d89.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
lokibot
http://171.22.30.164/kelly/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
4f3f8153b0841789234621447e7cdf6754b4d8494482853304a849d1ef2c0d89
-
Size
386KB
-
MD5
6ebb467dc49dbb2b90517da19cfb6c16
-
SHA1
0c3af6a618a75e73920c9872e50286eb987d6e79
-
SHA256
4f3f8153b0841789234621447e7cdf6754b4d8494482853304a849d1ef2c0d89
-
SHA512
3da116117767398befbd862294fbea6bb4d15eb21d8d6072722c8b7d80488b3f2668d3026d2d16bed9d669298b5c6e14c1d23f257729d50d6bd79931c2743637
-
SSDEEP
12288:1Y4UOpgCsQQjEyTpK/ucJKXH8HvuvJq4JI:1YF8gCbUQ/ucJKXXJq4JI
Score10/10-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-