General
-
Target
file.exe
-
Size
643KB
-
Sample
230612-rlpmsace29
-
MD5
e03a07b14036db47894ae0f73fd0fb3b
-
SHA1
6366abda03ba3e96ce34faf19180791678bbf308
-
SHA256
04a48f1ea58d9e0ee540bfe7cc4c0117c3724c91424c2afd35fcce4f88db7782
-
SHA512
8a7bd2903651009bda05b6f11c5d86477cb6c008e5e35521c008d1597e3adc78d8c1339c9716f50eb8a847a60e57ae9841b40f18bd13e09ac9a010f49e731da6
-
SSDEEP
6144:o9X0GSN2TRZV13cWT6MyjVRjmdStA21cogHwT3bRojTdQFVvFr1OsYTFhaIz+dfm:e0uph0B1DYTazjFBJESXNnQkC
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
lokibot
http://194.180.48.58/black/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
file.exe
-
Size
643KB
-
MD5
e03a07b14036db47894ae0f73fd0fb3b
-
SHA1
6366abda03ba3e96ce34faf19180791678bbf308
-
SHA256
04a48f1ea58d9e0ee540bfe7cc4c0117c3724c91424c2afd35fcce4f88db7782
-
SHA512
8a7bd2903651009bda05b6f11c5d86477cb6c008e5e35521c008d1597e3adc78d8c1339c9716f50eb8a847a60e57ae9841b40f18bd13e09ac9a010f49e731da6
-
SSDEEP
6144:o9X0GSN2TRZV13cWT6MyjVRjmdStA21cogHwT3bRojTdQFVvFr1OsYTFhaIz+dfm:e0uph0B1DYTazjFBJESXNnQkC
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-