General
-
Target
1d42e9031f45127f4dab62ac48f7774db6cfa1c785b87efdcdfa75073227b4e3.exe
-
Size
678KB
-
Sample
230706-m3zf4abe3w
-
MD5
7f8a2a95daef7e69f02b4be2191636ee
-
SHA1
7bdee38947928948a6e20e51d5bb27dffd597929
-
SHA256
1d42e9031f45127f4dab62ac48f7774db6cfa1c785b87efdcdfa75073227b4e3
-
SHA512
db48b453a8dfee96b333e4e69eac3d820ac54ac46f6273a7193f2ba6fa62543db51517763cccb6bce1cf2cd3ccfe57fc1bd74823fc3f6d85da80b0ea70d4d6ef
-
SSDEEP
12288:YeSF4+H0mIvgcx08Q4eqbq7u79ljQss1VIJFwbhaDnLMzIL2q+RTdOL8aLTATNZ2:PjCOyqGUL8+6NZS6nTEku0IF/
Static task
static1
Behavioral task
behavioral1
Sample
1d42e9031f45127f4dab62ac48f7774db6cfa1c785b87efdcdfa75073227b4e3.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
1d42e9031f45127f4dab62ac48f7774db6cfa1c785b87efdcdfa75073227b4e3.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
lokibot
http://194.180.48.58/size/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
1d42e9031f45127f4dab62ac48f7774db6cfa1c785b87efdcdfa75073227b4e3.exe
-
Size
678KB
-
MD5
7f8a2a95daef7e69f02b4be2191636ee
-
SHA1
7bdee38947928948a6e20e51d5bb27dffd597929
-
SHA256
1d42e9031f45127f4dab62ac48f7774db6cfa1c785b87efdcdfa75073227b4e3
-
SHA512
db48b453a8dfee96b333e4e69eac3d820ac54ac46f6273a7193f2ba6fa62543db51517763cccb6bce1cf2cd3ccfe57fc1bd74823fc3f6d85da80b0ea70d4d6ef
-
SSDEEP
12288:YeSF4+H0mIvgcx08Q4eqbq7u79ljQss1VIJFwbhaDnLMzIL2q+RTdOL8aLTATNZ2:PjCOyqGUL8+6NZS6nTEku0IF/
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-