General
-
Target
tmp
-
Size
813KB
-
Sample
230110-rhptdacb4v
-
MD5
46a28f1b24c3ae50f7630f544a7a55f3
-
SHA1
8746397c083ecd786e988c3f07a4989bdf6bcc82
-
SHA256
1ca4ca83f6246b9efaa32bc030d9373f72971fb01deff6499d6664fc7ce142e4
-
SHA512
44f3955a362271767377ade33c56dd9cb22b5dc3dedd1139f06c0345e50f4ce607a01bdda1df53d62dbeba018bcbb057fba641c76d1d84c9ad7b8526b1f07a1d
-
SSDEEP
24576:ReGs5nyyxk4YJ24hdYlXRgLlqEZV/NWC3gh/Wgfz:ReGs5nyCktF38mlqEZVuh/Wgf
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
http://171.22.30.147/gk1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
tmp
-
Size
813KB
-
MD5
46a28f1b24c3ae50f7630f544a7a55f3
-
SHA1
8746397c083ecd786e988c3f07a4989bdf6bcc82
-
SHA256
1ca4ca83f6246b9efaa32bc030d9373f72971fb01deff6499d6664fc7ce142e4
-
SHA512
44f3955a362271767377ade33c56dd9cb22b5dc3dedd1139f06c0345e50f4ce607a01bdda1df53d62dbeba018bcbb057fba641c76d1d84c9ad7b8526b1f07a1d
-
SSDEEP
24576:ReGs5nyyxk4YJ24hdYlXRgLlqEZV/NWC3gh/Wgfz:ReGs5nyCktF38mlqEZVuh/Wgf
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-