General
-
Target
kellyzx.exe
-
Size
328KB
-
Sample
230209-nrh6eaae5y
-
MD5
3bc68a0764ccc400c9a9f595e9f3ed3e
-
SHA1
e6107ca70a7e8461a0105fae3f8fe6de9a65ff17
-
SHA256
66bb9199ec8427d9425197aa3c8d006f4cdd8b1fa535e0de5312b3bddd832aec
-
SHA512
c8d2630a001f622cc6e1ad2e331c0766a318fe1ae68324444850013639440800e7ce38724c01604ae128b42fc5b41334ec6c91f31a54275232c6863f504fd008
-
SSDEEP
3072:4fY/TU9fE9PEtuElObFwb67xE8eXI8yMaaInFqCfKW7Hhlh7t1P37nLoq4wZGpx:uYa6aYFwbpIjzF3BltthLoq4wZ8
Static task
static1
Behavioral task
behavioral1
Sample
kellyzx.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
kellyzx.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
lokibot
http://171.22.30.147/kelly/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
kellyzx.exe
-
Size
328KB
-
MD5
3bc68a0764ccc400c9a9f595e9f3ed3e
-
SHA1
e6107ca70a7e8461a0105fae3f8fe6de9a65ff17
-
SHA256
66bb9199ec8427d9425197aa3c8d006f4cdd8b1fa535e0de5312b3bddd832aec
-
SHA512
c8d2630a001f622cc6e1ad2e331c0766a318fe1ae68324444850013639440800e7ce38724c01604ae128b42fc5b41334ec6c91f31a54275232c6863f504fd008
-
SSDEEP
3072:4fY/TU9fE9PEtuElObFwb67xE8eXI8yMaaInFqCfKW7Hhlh7t1P37nLoq4wZGpx:uYa6aYFwbpIjzF3BltthLoq4wZ8
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-