General
-
Target
b3b433d78fc1a8de3271a6d8b1adda6d6ef0ad4356659c19dc6ade6646aa9835_JC.exe
-
Size
528KB
-
Sample
230826-smb9hsbd79
-
MD5
c7aca6c178763fb39b67af30247bb22b
-
SHA1
3c2fa2178e3e661e0dc7a02976fe8c8f735bdc81
-
SHA256
b3b433d78fc1a8de3271a6d8b1adda6d6ef0ad4356659c19dc6ade6646aa9835
-
SHA512
c7ddc8bdeddee5781aa8b5851dbb9a4e6d85318fa379c0f833018b6b2155090743f4917537deb0c2ca01d48f54207bc91dc2b1ecaae2b4c7ce9f1643f4159a1a
-
SSDEEP
12288:GgmHFFDntMQ1yCY/z+ccZ7/VEgNCXMoO1Hvo:vmXtG1rncJtAMoO1H
Static task
static1
Behavioral task
behavioral1
Sample
b3b433d78fc1a8de3271a6d8b1adda6d6ef0ad4356659c19dc6ade6646aa9835_JC.exe
Resource
win7-20230712-en
Malware Config
Extracted
lokibot
http://194.55.224.9/luiz/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
b3b433d78fc1a8de3271a6d8b1adda6d6ef0ad4356659c19dc6ade6646aa9835_JC.exe
-
Size
528KB
-
MD5
c7aca6c178763fb39b67af30247bb22b
-
SHA1
3c2fa2178e3e661e0dc7a02976fe8c8f735bdc81
-
SHA256
b3b433d78fc1a8de3271a6d8b1adda6d6ef0ad4356659c19dc6ade6646aa9835
-
SHA512
c7ddc8bdeddee5781aa8b5851dbb9a4e6d85318fa379c0f833018b6b2155090743f4917537deb0c2ca01d48f54207bc91dc2b1ecaae2b4c7ce9f1643f4159a1a
-
SSDEEP
12288:GgmHFFDntMQ1yCY/z+ccZ7/VEgNCXMoO1Hvo:vmXtG1rncJtAMoO1H
-
Suspicious use of SetThreadContext
-