General
-
Target
eee5109b395394fb7899319c800346434515c733d75664882bfd76156c38c2af.zip
-
Size
186KB
-
Sample
230208-ly7fgaab46
-
MD5
358599bbe45dbc5c0a213ec24159e7c0
-
SHA1
d2f18430122d2eaa4c26eea858a352769855243c
-
SHA256
2101e0726bf4d7126778725e4e13682f2ca5e1aca62cdbd0c19dc781d9492b49
-
SHA512
0a8351291c8b78dfc086331898f33607a77298089b510b46da47b1b2ba2fe29cd4e0d8b627573bb6e2053d0dfc3c459bfa110c0e2469277b7ff4ac6bc0116453
-
SSDEEP
3072:a28zNC4styBj7c0LA05vGGTgwrsZJM6KF/esYmpm5s8ER6ALOgT5WAmnqJ:mzNClMwWAMGeFsqZ5Ks8QLOvzo
Static task
static1
Behavioral task
behavioral1
Sample
eee5109b395394fb7899319c800346434515c733d75664882bfd76156c38c2af.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eee5109b395394fb7899319c800346434515c733d75664882bfd76156c38c2af.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
lokibot
https://sempersim.su/ha1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
eee5109b395394fb7899319c800346434515c733d75664882bfd76156c38c2af.exe
-
Size
199KB
-
MD5
ecd901a84b82d00a82d45b4d0123352c
-
SHA1
d8780c1bfa80cd77eee71e8d3bd58699cc3f114b
-
SHA256
eee5109b395394fb7899319c800346434515c733d75664882bfd76156c38c2af
-
SHA512
058658693bbc1e27a4feb2760112d8b7ead2e2b305b210fa3f53fcfdbd356c60aa2484264c89e634d521aa8e993054434efa6996992f5ce463e2d796b0d77518
-
SSDEEP
6144:/Ya6c/gRLtu+LizVGXUl45puYIlS7HpQd8l:/Y6IRLtu+LCc5HIc9Qil
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-