General
-
Target
40a49e119b750ea5f228dbec54993049.bin
-
Size
841KB
-
Sample
230922-bqeelsbd7s
-
MD5
8df5e27c1740d70c9534a58cf810ff70
-
SHA1
092634ba0f70605829a694e7539846d684fd335c
-
SHA256
0fbfa826fe661f869d2c7d782b7013e0676ea99a23c05fe9f7ff44342c73833c
-
SHA512
4e5d1456565d87497050e2577073dcfbdeb9212f4011b40430ae1c1dffde2f042248f9a56f9f05d835a71c85931ff48f70b9ea66e242d322f1b3b6ad80f575af
-
SSDEEP
24576:cEj43LQDfeNGPFTgzUA5Cr0gkcLM+qxeV4:Z4pzH5Cr3LYE4
Static task
static1
Behavioral task
behavioral1
Sample
3e76776c7d6d505b91cc82d5d135f8c797fc9b3048981091c9102c84a2aedf66.xls
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3e76776c7d6d505b91cc82d5d135f8c797fc9b3048981091c9102c84a2aedf66.xls
Resource
win10v2004-20230915-en
Malware Config
Extracted
lokibot
http://zang2.areen.top/_errorpages/zang2/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
3e76776c7d6d505b91cc82d5d135f8c797fc9b3048981091c9102c84a2aedf66.bin
-
Size
1MB
-
MD5
40a49e119b750ea5f228dbec54993049
-
SHA1
1f4643129e658c8150a1c67969cf2923bc3616e9
-
SHA256
3e76776c7d6d505b91cc82d5d135f8c797fc9b3048981091c9102c84a2aedf66
-
SHA512
d4bc2150f68757d70f10f52204d399885e14b746624af30016df08bd52cfd66f9454aee9e2f43a3ed868c0ab97d49cf4b6f38027d2099662ae17bc62799399d6
-
SSDEEP
24576:CWQmmav30xSZy6w6VH6NnqZyew6V26N9+BZ49QUTwhfL/ywMp:HQmmQ306+6VamK6VDe89bTuLqv
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-