General
-
Target
oustanding invoice.exe
-
Size
691KB
-
Sample
230207-jkg8badd3x
-
MD5
977b2f9659866470764c169348e3ce8e
-
SHA1
1a9e9555059a62747b9d7c570397d282315fb253
-
SHA256
c7b0a971fcc7c2583cc85f297f6371d70b7f00df4ed538a6c54abd4574e580f7
-
SHA512
8e42be74101f0e27648321dcb5979fc671640df2b0c218eb2175f9fea02cbbfaecdacad366433b041b8e175b48f7cb20cf8cda16de4c3b54314f3fb6b19ba4d2
-
SSDEEP
12288:GOrx7p58lCrd4gyQapWMsCf8zajEkxxTNX2lM/5EAkLBWZ17YM2PA:TrxN5IC54TWMemjRx92l45BCgIMSA
Static task
static1
Behavioral task
behavioral1
Sample
oustanding invoice.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
oustanding invoice.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
http://208.67.105.148/primeminister/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
oustanding invoice.exe
-
Size
691KB
-
MD5
977b2f9659866470764c169348e3ce8e
-
SHA1
1a9e9555059a62747b9d7c570397d282315fb253
-
SHA256
c7b0a971fcc7c2583cc85f297f6371d70b7f00df4ed538a6c54abd4574e580f7
-
SHA512
8e42be74101f0e27648321dcb5979fc671640df2b0c218eb2175f9fea02cbbfaecdacad366433b041b8e175b48f7cb20cf8cda16de4c3b54314f3fb6b19ba4d2
-
SSDEEP
12288:GOrx7p58lCrd4gyQapWMsCf8zajEkxxTNX2lM/5EAkLBWZ17YM2PA:TrxN5IC54TWMemjRx92l45BCgIMSA
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-