General
-
Target
c688602b182b19febec802b0bcd2b5fb0834bacc291542b21da6c9a388d2634e
-
Size
149KB
-
Sample
230129-xvsnpaad62
-
MD5
6b9392df6b7881b18c34f13e84070d2e
-
SHA1
09f710957da335683e6b4091917abd2926df5b8d
-
SHA256
c688602b182b19febec802b0bcd2b5fb0834bacc291542b21da6c9a388d2634e
-
SHA512
185c2e432dfa7222fce16088b2b3fca01c995268b756400c3d9ff2d6f4254e02ba9573f8ce2a1ff32ad9b41df979dacc44c1ba76291e3da289a5d65b53ae9d0d
-
SSDEEP
3072:rf1BDZ0kVB67Duw9AMcTbDQ3QNsZy94wEy/RRWn9s2YB8zvr7t+o35G/tQnOiV2B:r9X0GfNNs8ey/vV248Tn5AgO5d
Static task
static1
Behavioral task
behavioral1
Sample
c688602b182b19febec802b0bcd2b5fb0834bacc291542b21da6c9a388d2634e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c688602b182b19febec802b0bcd2b5fb0834bacc291542b21da6c9a388d2634e.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
http://becharnise.ir/fb3/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
c688602b182b19febec802b0bcd2b5fb0834bacc291542b21da6c9a388d2634e
-
Size
149KB
-
MD5
6b9392df6b7881b18c34f13e84070d2e
-
SHA1
09f710957da335683e6b4091917abd2926df5b8d
-
SHA256
c688602b182b19febec802b0bcd2b5fb0834bacc291542b21da6c9a388d2634e
-
SHA512
185c2e432dfa7222fce16088b2b3fca01c995268b756400c3d9ff2d6f4254e02ba9573f8ce2a1ff32ad9b41df979dacc44c1ba76291e3da289a5d65b53ae9d0d
-
SSDEEP
3072:rf1BDZ0kVB67Duw9AMcTbDQ3QNsZy94wEy/RRWn9s2YB8zvr7t+o35G/tQnOiV2B:r9X0GfNNs8ey/vV248Tn5AgO5d
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-