General
-
Target
99e69a797b5bc14f55127bc7100aabb37683008fd89043a116c83f5255a1e6d1.zip
-
Size
675KB
-
Sample
230208-ly58eahf3y
-
MD5
7df4f9c83a30b95d8e3cfca1207e8114
-
SHA1
412f3e4f43974f851a19e97e583f0de2d9489679
-
SHA256
802ee60a4dea6dbdd586893327d9ff87805089584ecc7b6b884d7eab42b6467b
-
SHA512
de4e03cd1fe385e68d3f0e6832e49267fb5207f242e991c2feb9aef137b3f17df872a7f3dde99499a7028f87ab1ed24dd19093d5a5ce3986ad54f4ebb4fc6dac
-
SSDEEP
12288:P91UdM6PonOZSQw9rySuqxJGsCNxo7ck2+9v5VPE+j7cbrHhQsKhnb1m6fk:Fh6PoO3dSuqDGsC76B5VPdjgbrLib1mF
Static task
static1
Behavioral task
behavioral1
Sample
99e69a797b5bc14f55127bc7100aabb37683008fd89043a116c83f5255a1e6d1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
99e69a797b5bc14f55127bc7100aabb37683008fd89043a116c83f5255a1e6d1.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
lokibot
http://171.22.30.147/line/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
99e69a797b5bc14f55127bc7100aabb37683008fd89043a116c83f5255a1e6d1.exe
-
Size
705KB
-
MD5
40ea3a0c428397cc2feb2675cc37150c
-
SHA1
8b1a787ff8c044e5503139ceef1b68d68cff1f89
-
SHA256
99e69a797b5bc14f55127bc7100aabb37683008fd89043a116c83f5255a1e6d1
-
SHA512
ca903e627047cd8321acebfdd0f1227dd59e6e42361897936b05d2ba443d15c0176f3360d4cd47eb395947a932dcfc642a48ccc877b2eb0fc6b400123e5e9b3b
-
SSDEEP
12288:QpkNPA7cXnyXx6q16ahRZ5G1MQZAbRIgY5NiTisiS8fHXYvlC:pA71NMS5G1MQZAbRI35ATisizHXY
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-