General
-
Target
f5f266dc641ff0991027fb2c539423a86db1a2cbb8b8c57d0d628a0b13bafc86.zip
-
Size
644KB
-
Sample
230310-ngf83adc25
-
MD5
1c183b8f830b069b450b64621f77e62e
-
SHA1
bfeaa3c994468266e5cc2b7292e460cfb05b961e
-
SHA256
7b896b29a4c74139392c1e15582f4a0f5d5e7eac2a1c4368f77567b473524c9c
-
SHA512
5030316b214600038cdc718fbbe90c1ee404d10492e69658feb202ca780ddc86786a112c43c8e94e64e1ffbccf47efad410ced86dc0990f7d7167720307e98c6
-
SSDEEP
12288:SvFLO82RFZ9RKh/xEMpgxKBMxLj/IFtblGdeosMGaxtqcxPw3KtRmTtLvP:eFLj2w/JpgxLxLjAFtbsdeFMbLqOPwaI
Static task
static1
Behavioral task
behavioral1
Sample
f5f266dc641ff0991027fb2c539423a86db1a2cbb8b8c57d0d628a0b13bafc86.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f5f266dc641ff0991027fb2c539423a86db1a2cbb8b8c57d0d628a0b13bafc86.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
lokibot
http://171.22.30.147/kelly/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
f5f266dc641ff0991027fb2c539423a86db1a2cbb8b8c57d0d628a0b13bafc86.exe
-
Size
792KB
-
MD5
22d3492caf8b99c776b334b22450094e
-
SHA1
14268177336380e718bfe938de8efd004fc12a41
-
SHA256
f5f266dc641ff0991027fb2c539423a86db1a2cbb8b8c57d0d628a0b13bafc86
-
SHA512
7f773e38ac8afefb6b570c95a1fd81769027e256ec0cd2965cf5392bff33de27db04ce3d45fa4037ea4d2bc49b35001aa120de11bd615157040c2aeaf6565240
-
SSDEEP
24576:ia/5u61vgw6VThgJsaAOCsilDhGfRsSX:vtgdT6Jf8DXGfK
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-