General
-
Target
ae689510217def5fc9ab84494ba60989d314d6be64723bea48018eb6422c18b8
-
Size
358KB
-
Sample
230119-1y1egshe76
-
MD5
ed7eb7eb0f449590ff5852df0e00d0cc
-
SHA1
ef893ec10f4d4af7af3850ef73308741e9e41b83
-
SHA256
ae689510217def5fc9ab84494ba60989d314d6be64723bea48018eb6422c18b8
-
SHA512
40c117f385bfabe452166648a346e6d7746970dd09a3e289c38e14e10058ddeec1237b57c5fb11312da83866a96fa4152f19f9703c3f6cdd7a8ece1da636ea96
-
SSDEEP
6144:rYa69c20VErIMOEIomUwwT8x77yryDfaLJ+Ok+o9VfG9/O:rYLyVKIH8mUw8SiLJvCu9/O
Static task
static1
Behavioral task
behavioral1
Sample
ae689510217def5fc9ab84494ba60989d314d6be64723bea48018eb6422c18b8.exe
Resource
win10-20220812-en
Malware Config
Extracted
lokibot
https://sempersim.su/ha3/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
ae689510217def5fc9ab84494ba60989d314d6be64723bea48018eb6422c18b8
-
Size
358KB
-
MD5
ed7eb7eb0f449590ff5852df0e00d0cc
-
SHA1
ef893ec10f4d4af7af3850ef73308741e9e41b83
-
SHA256
ae689510217def5fc9ab84494ba60989d314d6be64723bea48018eb6422c18b8
-
SHA512
40c117f385bfabe452166648a346e6d7746970dd09a3e289c38e14e10058ddeec1237b57c5fb11312da83866a96fa4152f19f9703c3f6cdd7a8ece1da636ea96
-
SSDEEP
6144:rYa69c20VErIMOEIomUwwT8x77yryDfaLJ+Ok+o9VfG9/O:rYLyVKIH8mUw8SiLJvCu9/O
Score10/10-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-