General
-
Target
tmp
-
Size
344KB
-
Sample
230116-gnwh1aea8w
-
MD5
419d97afbdef4d3bbdfed37cf2522cc1
-
SHA1
da5890bca82bbdaaa771426f64bb888c7ab2479d
-
SHA256
c60e5978dd457e4e51c9df1d33c844aaab32a873aec48372adb988ca9647cd9b
-
SHA512
e70a5466d76308ebd20aba1149e07250561fc36bf823847d80c3629fd84b8a8c2c321a62bc23d5972e15b11db397d314923940945d956c5ceaf95f55c07db66b
-
SSDEEP
6144:aYa6FcQ9cOJ/0+KC8k5LHsi/MYfvFFoJ4xbZyV:aYgQm7CTLDBfv/u4xbu
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
https://sempersim.su/ha1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
tmp
-
Size
344KB
-
MD5
419d97afbdef4d3bbdfed37cf2522cc1
-
SHA1
da5890bca82bbdaaa771426f64bb888c7ab2479d
-
SHA256
c60e5978dd457e4e51c9df1d33c844aaab32a873aec48372adb988ca9647cd9b
-
SHA512
e70a5466d76308ebd20aba1149e07250561fc36bf823847d80c3629fd84b8a8c2c321a62bc23d5972e15b11db397d314923940945d956c5ceaf95f55c07db66b
-
SSDEEP
6144:aYa6FcQ9cOJ/0+KC8k5LHsi/MYfvFFoJ4xbZyV:aYgQm7CTLDBfv/u4xbu
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-