General
-
Target
9b5f04b58d83c067c57bd8fc882566c2d11e082e7fcfc80bb235d7ad1fb2753c
-
Size
361KB
-
Sample
230119-v6m68sdf6y
-
MD5
e66d99ac51923a4464514e0efd451da8
-
SHA1
315a824fa28e1a6cf758fa7a7addd2af19b44084
-
SHA256
9b5f04b58d83c067c57bd8fc882566c2d11e082e7fcfc80bb235d7ad1fb2753c
-
SHA512
e30dc4d3a0ba98b73f7e8e81c431a3393ec046a1e7e69003cf967d7ff3259f906006e3a02a43dbced3d684096517a60d2df929807f76d07f23086944a2c3fe2c
-
SSDEEP
6144:bYa6M86ODE4GKwjSIs7mxFcTqXSNZC+WrW5WdPXIxqQdBCkbi67:bY6pGE4GZjS+xFcT5Pmibi67
Static task
static1
Behavioral task
behavioral1
Sample
9b5f04b58d83c067c57bd8fc882566c2d11e082e7fcfc80bb235d7ad1fb2753c.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
http://171.22.30.147/kelly/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
9b5f04b58d83c067c57bd8fc882566c2d11e082e7fcfc80bb235d7ad1fb2753c
-
Size
361KB
-
MD5
e66d99ac51923a4464514e0efd451da8
-
SHA1
315a824fa28e1a6cf758fa7a7addd2af19b44084
-
SHA256
9b5f04b58d83c067c57bd8fc882566c2d11e082e7fcfc80bb235d7ad1fb2753c
-
SHA512
e30dc4d3a0ba98b73f7e8e81c431a3393ec046a1e7e69003cf967d7ff3259f906006e3a02a43dbced3d684096517a60d2df929807f76d07f23086944a2c3fe2c
-
SSDEEP
6144:bYa6M86ODE4GKwjSIs7mxFcTqXSNZC+WrW5WdPXIxqQdBCkbi67:bY6pGE4GZjS+xFcT5Pmibi67
Score10/10-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-