General
-
Target
cf9385e0f28a36cb73ddde5acbc849d7dabf0cfbd417fae804f8d3044256f456
-
Size
1.2MB
-
Sample
230129-y8pdvscb43
-
MD5
28623b26c8ba26b82ae87d192d71c1a2
-
SHA1
8691ebc6dcf40563adee031c7b9dbf692a9106b9
-
SHA256
cf9385e0f28a36cb73ddde5acbc849d7dabf0cfbd417fae804f8d3044256f456
-
SHA512
7567ec1025b2291ac4008b92fe4604eb4345285cf3b68952e1a0db327cd90446ded4f9def70a46dab8d5d73a0fa3ed27dcdd7e6f95ecd12c171511f2600cf5e8
-
SSDEEP
12288:R3ojRIQeeo3o0M9bWyFDrBulRbRbs1pCJd28bsEbuhv2jZaAL7ujXIZbMDRr+4JW:t7iepJdzupSEYutcvUjkczozEI86A
Static task
static1
Behavioral task
behavioral1
Sample
cf9385e0f28a36cb73ddde5acbc849d7dabf0cfbd417fae804f8d3044256f456.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cf9385e0f28a36cb73ddde5acbc849d7dabf0cfbd417fae804f8d3044256f456.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
lokibot
http://tuqianq.com/kali/kali/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
cf9385e0f28a36cb73ddde5acbc849d7dabf0cfbd417fae804f8d3044256f456
-
Size
1.2MB
-
MD5
28623b26c8ba26b82ae87d192d71c1a2
-
SHA1
8691ebc6dcf40563adee031c7b9dbf692a9106b9
-
SHA256
cf9385e0f28a36cb73ddde5acbc849d7dabf0cfbd417fae804f8d3044256f456
-
SHA512
7567ec1025b2291ac4008b92fe4604eb4345285cf3b68952e1a0db327cd90446ded4f9def70a46dab8d5d73a0fa3ed27dcdd7e6f95ecd12c171511f2600cf5e8
-
SSDEEP
12288:R3ojRIQeeo3o0M9bWyFDrBulRbRbs1pCJd28bsEbuhv2jZaAL7ujXIZbMDRr+4JW:t7iepJdzupSEYutcvUjkczozEI86A
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-