General
-
Target
acee2bc6a804370a0528929276007ec1f04248c6e52b49d28dc51cb4467bec97
-
Size
903KB
-
Sample
230129-y4f7padd7z
-
MD5
b9b6e4b25b5162a45c43fec244259859
-
SHA1
f586e85b0882d7970cbc2cd31825f88ef1954f93
-
SHA256
acee2bc6a804370a0528929276007ec1f04248c6e52b49d28dc51cb4467bec97
-
SHA512
9bbff01c106e3172bc8d57ca9eae2cd381f9ab5007b654010fbea7c70474a65fd1e4ebdc597f9366556140be01a1abdb9aa4678095082210a730b9aec0444d74
-
SSDEEP
12288:HC8WySCiSdWunLEQiydW+PWk7iWriyfpbkukWO8Jxdekejd0Y9pGB9vJ2XHM046g:HDOnRv9kIXHqVgsY2d
Static task
static1
Behavioral task
behavioral1
Sample
acee2bc6a804370a0528929276007ec1f04248c6e52b49d28dc51cb4467bec97.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
acee2bc6a804370a0528929276007ec1f04248c6e52b49d28dc51cb4467bec97.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
lokibot
http://3tril.com/armani2/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
acee2bc6a804370a0528929276007ec1f04248c6e52b49d28dc51cb4467bec97
-
Size
903KB
-
MD5
b9b6e4b25b5162a45c43fec244259859
-
SHA1
f586e85b0882d7970cbc2cd31825f88ef1954f93
-
SHA256
acee2bc6a804370a0528929276007ec1f04248c6e52b49d28dc51cb4467bec97
-
SHA512
9bbff01c106e3172bc8d57ca9eae2cd381f9ab5007b654010fbea7c70474a65fd1e4ebdc597f9366556140be01a1abdb9aa4678095082210a730b9aec0444d74
-
SSDEEP
12288:HC8WySCiSdWunLEQiydW+PWk7iWriyfpbkukWO8Jxdekejd0Y9pGB9vJ2XHM046g:HDOnRv9kIXHqVgsY2d
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-