General
-
Target
8edab3d9b5bc81b5ef374f427a2dac801ada0d6fbd0b913b6908ece1ce7768ac.zip
-
Size
259KB
-
Sample
230208-ly8zasab53
-
MD5
016d79fffb093f56513f8813c9bb5eb5
-
SHA1
a2f51a0d018a6beb8675dda4cb942e26576af124
-
SHA256
5fdb4c2a26b335b47b81bae4f50e4d5c156d3f4d761f084805fad2d5684f662c
-
SHA512
7e5f242ef7d9dd4b608fec0237a8797ac127bf1f94df83f333e9621258198dc0ce469055bc5291921bedf80d112f84b1fe9f771da17ca0d6f8c101576e326b99
-
SSDEEP
6144:JKu+dFGsDs75S39a8XMNHDvrzhvNWH0TzeMgsOCFysEG:J4Es0gwVtvNWUG7sO92
Static task
static1
Behavioral task
behavioral1
Sample
Shippment Swift Copy.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Shippment Swift Copy.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
lokibot
https://sempersim.su/ha12/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Shippment Swift Copy.exe
-
Size
344KB
-
MD5
8ed4cf27c1633d3c25e6980f5ee8d8fa
-
SHA1
10565a5953569a1657afa4873401e2d8e8940f2b
-
SHA256
a3c7d60f19310f7dbecce1acba480a79cc7d7839aed4467bdd3eb374bfcd68eb
-
SHA512
4296e8bb86e2b6cfbedc8fe856bd66956cf1a6688ba1d19d9ccaae5544f62daf866329ab35bf20d541e7a161b21163c4f61346828cc923138ce4509a98447a7d
-
SSDEEP
6144:8Ya6O4eRhQ9sVnQxU1vg8eE9N43l6lE/Ml6yZq0Shc8PGzAZ:8Y1eRh3nWUJg8eE99l6Uq0Shc/zC
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-