General
-
Target
5055c28ba9fde6ddfde33000bbfb39deca723bfac56c23029a54dd7bdb748e3b_JC.exe
-
Size
466KB
-
Sample
230923-xbt3eahf5w
-
MD5
043e70250aeeec512af0393baf488866
-
SHA1
e5d62e24ab01bc092c1a873c4739fbdb17543f60
-
SHA256
5055c28ba9fde6ddfde33000bbfb39deca723bfac56c23029a54dd7bdb748e3b
-
SHA512
d2cb7a05eee7456e69abc530c569d1660adf7950bda6caa676f033ad646cea20cc0c13386a6431b62820050e4f02347d1a61b20e163b478fc77dacb660f3a437
-
SSDEEP
12288:Z6xVbj2kpoWql/z5n7jqi8cypyJglxOY2IdwOc:Z0RDydlLJi/crJg7OkaO
Static task
static1
Behavioral task
behavioral1
Sample
5055c28ba9fde6ddfde33000bbfb39deca723bfac56c23029a54dd7bdb748e3b_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5055c28ba9fde6ddfde33000bbfb39deca723bfac56c23029a54dd7bdb748e3b_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
lokibot
http://zang2.areen.top/_errorpages/zang2/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
5055c28ba9fde6ddfde33000bbfb39deca723bfac56c23029a54dd7bdb748e3b_JC.exe
-
Size
466KB
-
MD5
043e70250aeeec512af0393baf488866
-
SHA1
e5d62e24ab01bc092c1a873c4739fbdb17543f60
-
SHA256
5055c28ba9fde6ddfde33000bbfb39deca723bfac56c23029a54dd7bdb748e3b
-
SHA512
d2cb7a05eee7456e69abc530c569d1660adf7950bda6caa676f033ad646cea20cc0c13386a6431b62820050e4f02347d1a61b20e163b478fc77dacb660f3a437
-
SSDEEP
12288:Z6xVbj2kpoWql/z5n7jqi8cypyJglxOY2IdwOc:Z0RDydlLJi/crJg7OkaO
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-