General
-
Target
cluton.exe
-
Size
282KB
-
Sample
230316-h6gy1abh9w
-
MD5
173cc49904c607c514e2f4a2054aaca0
-
SHA1
0b185b7649c50d06a5d115a210aa3496abf445c2
-
SHA256
985d2a5f97ed03ae735c7f30f950846339d5fce5c18491326edec9a8be5cc509
-
SHA512
f2a83903311969c96aa44df504e9c8118fb2be0a46058502da744ab4790c476e36474ec856afc8a70d599e11df319597d0998f7f9d9e0751899eac92fe567624
-
SSDEEP
3072:1BkfJpRXATwMdFCcJKTTGoE+l4lPRQ4aKhyLd1bWqf20AoZbwh8LsZU2z0Ai1:1qjITj9RQ4aKhSnf1AoZgqV1
Static task
static1
Behavioral task
behavioral1
Sample
cluton.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
lokibot
http://bauxx.xyz/mtk1/w2/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
cluton.exe
-
Size
282KB
-
MD5
173cc49904c607c514e2f4a2054aaca0
-
SHA1
0b185b7649c50d06a5d115a210aa3496abf445c2
-
SHA256
985d2a5f97ed03ae735c7f30f950846339d5fce5c18491326edec9a8be5cc509
-
SHA512
f2a83903311969c96aa44df504e9c8118fb2be0a46058502da744ab4790c476e36474ec856afc8a70d599e11df319597d0998f7f9d9e0751899eac92fe567624
-
SSDEEP
3072:1BkfJpRXATwMdFCcJKTTGoE+l4lPRQ4aKhyLd1bWqf20AoZbwh8LsZU2z0Ai1:1qjITj9RQ4aKhSnf1AoZgqV1
Score10/10-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-