General
-
Target
OUTSTANDING INVOICE20222.exe
-
Size
691KB
-
Sample
230117-khkq4ada84
-
MD5
bbcf4c3eb99f83a44a33756f4d60c510
-
SHA1
451a5e797841a7efd3b6ed5508cdda7f158bc9c3
-
SHA256
bdf40e1a0b438ef4e304c034b2c10f0226cb710a824a12cada02557b49164654
-
SHA512
e48a9db5e2461b1dbde60bd21c9a50c927566cee311c2984f3a3efa937b4a1c3f82ab50bd1752892a037c1c0a2ae689a66c7c0a265b4b5d7846a16097c394797
-
SSDEEP
12288:d2m8Pf2ZlA+wwanu0b2idzV+ngRe2Ai6hWLKmGOGwgNoexY/NTlEc:d2Aewa32irRO/QLowgNNx8NTl5
Static task
static1
Behavioral task
behavioral1
Sample
OUTSTANDING INVOICE20222.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
OUTSTANDING INVOICE20222.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
lokibot
http://171.22.30.164/prime1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
OUTSTANDING INVOICE20222.exe
-
Size
691KB
-
MD5
bbcf4c3eb99f83a44a33756f4d60c510
-
SHA1
451a5e797841a7efd3b6ed5508cdda7f158bc9c3
-
SHA256
bdf40e1a0b438ef4e304c034b2c10f0226cb710a824a12cada02557b49164654
-
SHA512
e48a9db5e2461b1dbde60bd21c9a50c927566cee311c2984f3a3efa937b4a1c3f82ab50bd1752892a037c1c0a2ae689a66c7c0a265b4b5d7846a16097c394797
-
SSDEEP
12288:d2m8Pf2ZlA+wwanu0b2idzV+ngRe2Ai6hWLKmGOGwgNoexY/NTlEc:d2Aewa32irRO/QLowgNNx8NTl5
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-