General
-
Target
SOA JUNE.exe
-
Size
176KB
-
Sample
230727-l43z8sdh85
-
MD5
0be76c19f43277d0b6342ecef7b9d9d5
-
SHA1
d4e7f82cbab575ea5eae1e52dfcffc63eb50f33f
-
SHA256
e83b0e26058ef4f99d65b636a50038f67f1cee47cde9ae818ab10386155ca476
-
SHA512
1e44b338c14d02d7acd998befa4d933362419fde425846bb33ee13acdcb7b78bfd88d1e6b211b0668677608e2b1aaccd0c6fd6ab3bafe693877c6b18ff823a0c
-
SSDEEP
3072:HfY/TU9fE9PEtuebEut0SytJI9e2ceqg1zZsmAJVZnC/S6F/2dOrX/a//9DYFQ+F:/Ya6G5tlnbcxgHsZA/2dOTa//5YOE
Static task
static1
Behavioral task
behavioral1
Sample
SOA JUNE.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SOA JUNE.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
lokibot
http://87.121.47.132/noko/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
SOA JUNE.exe
-
Size
176KB
-
MD5
0be76c19f43277d0b6342ecef7b9d9d5
-
SHA1
d4e7f82cbab575ea5eae1e52dfcffc63eb50f33f
-
SHA256
e83b0e26058ef4f99d65b636a50038f67f1cee47cde9ae818ab10386155ca476
-
SHA512
1e44b338c14d02d7acd998befa4d933362419fde425846bb33ee13acdcb7b78bfd88d1e6b211b0668677608e2b1aaccd0c6fd6ab3bafe693877c6b18ff823a0c
-
SSDEEP
3072:HfY/TU9fE9PEtuebEut0SytJI9e2ceqg1zZsmAJVZnC/S6F/2dOrX/a//9DYFQ+F:/Ya6G5tlnbcxgHsZA/2dOTa//5YOE
Score10/10-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-