General
-
Target
a33eccf055f2f191059c156d868aaf2cf5f1c451587b23e41bfcd77f5b0eacc0
-
Size
184KB
-
Sample
230123-xsa1vsge3x
-
MD5
86ecf018b7711d3a453ceeca71cdd7fe
-
SHA1
343a3005c6729f4ceb2dc3c9b0a44aa317d0a99a
-
SHA256
a33eccf055f2f191059c156d868aaf2cf5f1c451587b23e41bfcd77f5b0eacc0
-
SHA512
3e070d28644fc03364c8a419a6c618a069c069a3fa445e96b7d09faa9b9139456a4f42027e55fb9445d504e71a31eecde798728181f9c511ab46eb68c487a14a
-
SSDEEP
3072:HfY/TU9fE9PEtuFbpwhkfFRpS5FKR2AYs5wuoe9Zn/t0tYa2eC+P/TNPJWq94Jnp:/Ya6DpCmhS02Ls+49Zn/StYGCE/TKqqT
Static task
static1
Behavioral task
behavioral1
Sample
a33eccf055f2f191059c156d868aaf2cf5f1c451587b23e41bfcd77f5b0eacc0.exe
Resource
win10-20220812-en
Malware Config
Extracted
lokibot
https://sempersim.su/ha1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
a33eccf055f2f191059c156d868aaf2cf5f1c451587b23e41bfcd77f5b0eacc0
-
Size
184KB
-
MD5
86ecf018b7711d3a453ceeca71cdd7fe
-
SHA1
343a3005c6729f4ceb2dc3c9b0a44aa317d0a99a
-
SHA256
a33eccf055f2f191059c156d868aaf2cf5f1c451587b23e41bfcd77f5b0eacc0
-
SHA512
3e070d28644fc03364c8a419a6c618a069c069a3fa445e96b7d09faa9b9139456a4f42027e55fb9445d504e71a31eecde798728181f9c511ab46eb68c487a14a
-
SSDEEP
3072:HfY/TU9fE9PEtuFbpwhkfFRpS5FKR2AYs5wuoe9Zn/t0tYa2eC+P/TNPJWq94Jnp:/Ya6DpCmhS02Ls+49Zn/StYGCE/TKqqT
Score10/10-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-