General
-
Target
tmp
-
Size
204KB
-
Sample
230327-mklghsda39
-
MD5
771ceef25e513ae88bda595e5e3b08df
-
SHA1
5b83d32288a62b47f202676189be3831f16a9ffa
-
SHA256
5408bf54a92e5997a90cdae006b6ef9b42b8654e0341ddfb36aece278ca45204
-
SHA512
76872f6cd0c36f75fd772f31c8fa93edd4de3624d8c61e7aad6f4b1d21535012801e2b4ddf9766869d5f7c30ca9fcd342103724ee070a2ce27afd661949bb09a
-
SSDEEP
3072:3fY/TU9fE9PEtu7b/LLpVjntkPrzNAK/secbtSUEUbOlXxVI6QJSBi+5AQqY84ka:vYa6tvpVKrpPkNLaOfJSb57qt4GWN
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
lokibot
http://185.246.220.85/irem/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
tmp
-
Size
204KB
-
MD5
771ceef25e513ae88bda595e5e3b08df
-
SHA1
5b83d32288a62b47f202676189be3831f16a9ffa
-
SHA256
5408bf54a92e5997a90cdae006b6ef9b42b8654e0341ddfb36aece278ca45204
-
SHA512
76872f6cd0c36f75fd772f31c8fa93edd4de3624d8c61e7aad6f4b1d21535012801e2b4ddf9766869d5f7c30ca9fcd342103724ee070a2ce27afd661949bb09a
-
SSDEEP
3072:3fY/TU9fE9PEtu7b/LLpVjntkPrzNAK/secbtSUEUbOlXxVI6QJSBi+5AQqY84ka:vYa6tvpVKrpPkNLaOfJSb57qt4GWN
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-