General
-
Target
00472fb7e9be629b6d8a1436949bbfb1.bin
-
Size
688KB
-
Sample
230120-qd545afg5x
-
MD5
59e2e8b03720160f3744e433c7e04b5d
-
SHA1
4962d78cc24d1b706ac173a922e80d5588f13ae9
-
SHA256
3fb2ae8f8e712bacf0063b158abc366acc4718fe52fe0d3efbfd95e885ce0389
-
SHA512
df7a32a7a7f7a5b201f7880c9aa05a48c4d3bc717117700231018b8c8cb72edd5d430baa0c3ff5449dd41ba662ff807394645af38afa3236ba57de451c5374fe
-
SSDEEP
12288:P6xKjIAd57nIuSUGC4t0FqvnTXFgPqUtwb3NcwFRd8rHpL+GoQuAM0n:P9jt5sCdFq5gPqMYfOHBxopY
Static task
static1
Behavioral task
behavioral1
Sample
d75ab859064eaea321a5a7f11a4b0cb4ab85d987c41f293ea879e374b7348cae.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d75ab859064eaea321a5a7f11a4b0cb4ab85d987c41f293ea879e374b7348cae.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
lokibot
http://208.67.105.148/fresh2/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d75ab859064eaea321a5a7f11a4b0cb4ab85d987c41f293ea879e374b7348cae.exe
-
Size
811KB
-
MD5
00472fb7e9be629b6d8a1436949bbfb1
-
SHA1
34d8bde6eafd60b22e64690472ee5607ad954948
-
SHA256
d75ab859064eaea321a5a7f11a4b0cb4ab85d987c41f293ea879e374b7348cae
-
SHA512
e4ffa3e4a6eb652c82aaf769f1800046c256bec8c9c685abf73e3e3992af5101240b3bc241ee2888802a5df0498448aed074876236fe292b3ded977c9f6a6acd
-
SSDEEP
24576:u+pmxdK1vfXdyg55Gs5nyyxDqEZV/NWCHgh/Wgfz:ubxdsvP0KGs5nyCDqEZVeh/Wgf
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-