General
-
Target
b5099188607d5dfab768d99024eaffeb3c202404bd8d27d3271197ffeafcd9b1
-
Size
463KB
-
Sample
230129-x8vefacd5x
-
MD5
ca0063f843c21fb163f104823ff68ced
-
SHA1
c72aa22b38285e437aac3c9dc47d9545aa4d816d
-
SHA256
b5099188607d5dfab768d99024eaffeb3c202404bd8d27d3271197ffeafcd9b1
-
SHA512
cc8ba4f7ce8f48ac1ff2f9590bc174469c6203a9a1900647b416f1831082efa68ea35fc66415c028008b5789a4a25c4c9e2417f85a200395508c72df2c819f1d
-
SSDEEP
12288:DJCnJCXCbYQjoiuN3JNspX9lMYnvFjAAZnreGY+B:IcXCbYQjoBN3JNsFv9tr3
Static task
static1
Behavioral task
behavioral1
Sample
b5099188607d5dfab768d99024eaffeb3c202404bd8d27d3271197ffeafcd9b1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b5099188607d5dfab768d99024eaffeb3c202404bd8d27d3271197ffeafcd9b1.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
lokibot
http://51.195.53.221/p.php/syPLR31sAspbS
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
b5099188607d5dfab768d99024eaffeb3c202404bd8d27d3271197ffeafcd9b1
-
Size
463KB
-
MD5
ca0063f843c21fb163f104823ff68ced
-
SHA1
c72aa22b38285e437aac3c9dc47d9545aa4d816d
-
SHA256
b5099188607d5dfab768d99024eaffeb3c202404bd8d27d3271197ffeafcd9b1
-
SHA512
cc8ba4f7ce8f48ac1ff2f9590bc174469c6203a9a1900647b416f1831082efa68ea35fc66415c028008b5789a4a25c4c9e2417f85a200395508c72df2c819f1d
-
SSDEEP
12288:DJCnJCXCbYQjoiuN3JNspX9lMYnvFjAAZnreGY+B:IcXCbYQjoBN3JNsFv9tr3
Score10/10-
Beds Protector Packer
Detects Beds Protector packer used to load .NET malware.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-