General
-
Target
RFQ_Q10865.zip
-
Size
37KB
-
Sample
230816-mcqq9sab79
-
MD5
1195cfab5f196a6b1616f1be4c4af958
-
SHA1
24473b6cae7aff0e2eab4ee2cb1d046814572afa
-
SHA256
8db033aebd6a0192357eb2133a4a877e6c9401e5e68869224a5b11c39d2b8887
-
SHA512
777ae04ffc0eca7b4bb6f37ad2808bd53b074cb20af5f96f2ef596dc6b7ea6fa4daf60d9b0f787012c4dcd396e664b625590273f651f085b4fb402a19f3f587e
-
SSDEEP
768:0S3T64VFo9wjA1WvvFqyFitPGGNWs1aUcX4tn9/CeL1OIPUKN:F24VFiwjY4V0HNWQPqepHP3
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_Q10865.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
RFQ_Q10865.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
lokibot
http://79.110.48.215/thirdugo/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
RFQ_Q10865.exe
-
Size
82KB
-
MD5
a1bee18c82eaf97122737ee0fb1e2202
-
SHA1
3ab614dccd7173f42e16404138ef9809aec20060
-
SHA256
2f19a13d5de4a03152094890cb3c61b1d01ab5ff758a4d457a5df670f1cb3d75
-
SHA512
1e33367c546601390e52f9c05c126fd471a802cf1a1ddce41d9374fd41b5e88069d6f44ff5bb76935ffad3d1bf428304ac8bf8bbb34071da8cb0a58560e613c0
-
SSDEEP
1536:3CMv7TbXyqQJvHyn60ugjYPvHNeF/eReinV4+LCMGMjcLeOYLM3UfLUzjC+:3CMv7TbXyqQJvHywPvC/eReinVLLChMu
Score10/10-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-