General
-
Target
9cbc533aff85bb22a0c012e58d2a1778.bin
-
Size
244KB
-
Sample
230123-sk7yeadh27
-
MD5
f6a1c4424fe9cf42c09af15755ada791
-
SHA1
8e072e2b70898b7df232575e12cb4c5b87708e4b
-
SHA256
f59b1d73dda7c1c4b29a3f23819eef55f76046c7863613cb6b89bb3274746c6c
-
SHA512
b8e295b7a242ecc09789808c941c967b47cded8356379e149bac2d1c6effd5be4f6506c94bbb4b7b387c8dd785aea2307285bd9dea7d356feb561ad61d59bf79
-
SSDEEP
6144:V7gr9xT2YxEiVwUp9iCBqJaT3GIWa1756nA3/AgjF5/:VMrqYxEiKUP/AJu3HIWIgjL/
Static task
static1
Behavioral task
behavioral1
Sample
94b663af143a52ec5359cfff5de5a8a7bca5c9a137b67cbe0b6e5a934d140b77.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
94b663af143a52ec5359cfff5de5a8a7bca5c9a137b67cbe0b6e5a934d140b77.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
lokibot
https://sempersim.su/ha1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
94b663af143a52ec5359cfff5de5a8a7bca5c9a137b67cbe0b6e5a934d140b77.exe
-
Size
410KB
-
MD5
9cbc533aff85bb22a0c012e58d2a1778
-
SHA1
9598a98df4ceac0388e76af0cc39b4fc26700984
-
SHA256
94b663af143a52ec5359cfff5de5a8a7bca5c9a137b67cbe0b6e5a934d140b77
-
SHA512
0a48ef29983e20250e1ecf1e7e5b682694c1a46c2bbf3c11f28b2bfc92e8d80e346d64db26aea1bf293d2b9ecbc1499cd16e939c3b83c91dce9cf86825481e57
-
SSDEEP
6144:oYa6K3bNiLERtuuxfcZHBiRxOij2oG5pT52EPqzbBq:oYw3bcQuuxfc1IMi452EwBq
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-