General
-
Target
TRANSFERENCIA RÁPIDA.IMG
-
Size
1.2MB
-
Sample
230206-vjypfsfa36
-
MD5
47a95b7a538ed79dd4674d2c1a1f7e9e
-
SHA1
895ea0594aa9b547740a858186315619fef20053
-
SHA256
2a3d80eb90f209dde55752ac3b1fef298277d76e5137cfc364a79fdb5637e33b
-
SHA512
478aad656f40ad8264317d48bd93afedcc09a4a8c39a7d67cab72baf59326466ba76dcfd1833573e366a757129ccb147f1a7d9c419744549c16949b2679a893b
-
SSDEEP
24576:Vgc0y7MTyPdLX2tuCAe/ZXxL+rOkbe+FSF:2UbeGS
Static task
static1
Behavioral task
behavioral1
Sample
TRANSFER.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
TRANSFER.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
lokibot
https://sempersim.su/ha7/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
TRANSFER.EXE
-
Size
516KB
-
MD5
38e7aacad8e6cd46fc2dddfa743b223f
-
SHA1
e1e48d6876856ddefb800d2d9f15efee5ed64ff6
-
SHA256
a2030b4cc31eeba0dec3265f4a30324f1825bd5c2fcff922836d7d4d8cfb085e
-
SHA512
48c2b0b8d2e54c27063e0fd68012fc2fe7fab2422ce85d7cd7876cfb0d872724a839f54a650749b999b55d74df73ff6a584adbee7de25499fa7410dc41f65a18
-
SSDEEP
12288:V6LPDcQVElDne7f4WYMTyPdLX2tuCAe/ZX55x8qdAZBWf5i7qAO4Nxbe+FiFF6:Vgc0y7MTyPdLX2tuCAe/ZXxL+rOkbe+s
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-