General
-
Target
76508BEC6DB5BF37EC4D0EC301AA607B30AEFD1AC0DC0.exe
-
Size
550KB
-
Sample
230205-vwzghsac29
-
MD5
a46c816dec5e5b223c312f3ef7ac24d0
-
SHA1
69d5efe2394c4a21bfeccee6aee69a12a06d31e9
-
SHA256
76508bec6db5bf37ec4d0ec301aa607b30aefd1ac0dc0a5ea91dcf12bf076ec6
-
SHA512
dd2159ffd4708583e8effc649d8ce3280fb5a968e1b253982020fb4922cc1a723b0d6f84875439c9d6db6e098b0b85f8d8aa497c947e9cd9ce2f34c6b80de293
-
SSDEEP
6144:fZXnyAZYtYUfe7xCQkGBb/A3LlkHWcA0I7uyMrtYty10DAgBjwSwDpL8CIHPLmWJ:fZXTjn+Ywf9zzC0Km3CjhRHjMylwt
Static task
static1
Behavioral task
behavioral1
Sample
76508BEC6DB5BF37EC4D0EC301AA607B30AEFD1AC0DC0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
76508BEC6DB5BF37EC4D0EC301AA607B30AEFD1AC0DC0.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
http://rhinestone.cc/obino/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
76508BEC6DB5BF37EC4D0EC301AA607B30AEFD1AC0DC0.exe
-
Size
550KB
-
MD5
a46c816dec5e5b223c312f3ef7ac24d0
-
SHA1
69d5efe2394c4a21bfeccee6aee69a12a06d31e9
-
SHA256
76508bec6db5bf37ec4d0ec301aa607b30aefd1ac0dc0a5ea91dcf12bf076ec6
-
SHA512
dd2159ffd4708583e8effc649d8ce3280fb5a968e1b253982020fb4922cc1a723b0d6f84875439c9d6db6e098b0b85f8d8aa497c947e9cd9ce2f34c6b80de293
-
SSDEEP
6144:fZXnyAZYtYUfe7xCQkGBb/A3LlkHWcA0I7uyMrtYty10DAgBjwSwDpL8CIHPLmWJ:fZXTjn+Ywf9zzC0Km3CjhRHjMylwt
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-