General
-
Target
tmpg67uz36y
-
Size
518KB
-
Sample
231002-xk3e5sfe92
-
MD5
0284ad037d53c56fb477e1df0a9fe8c4
-
SHA1
ee451b6b8d883bd3535c5523697093743d94813f
-
SHA256
b5797aaf9a2230a8703d9b814835822c8abc6da3fb5fe1435528964f713abbc4
-
SHA512
99eadb5596d66414e39e19cfd647c76f890d591b4d8ebf5b7606b53190d36fc0958460487ab5380cfebb2cbceaeb2a7a22a1ffbb7780c1d15ea60e219f17f682
-
SSDEEP
12288:wpmNumB0apppjNOwS/5tdptmistXV6vonqhcSPHgw6NG5GQ/RTp:oty3DcpiNShcS/gU1/R1
Static task
static1
Behavioral task
behavioral1
Sample
tmpg67uz36y.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
tmpg67uz36y.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
lokibot
http://45.77.76.224/~clinics/TWnwcu578emCVQ9B
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
tmpg67uz36y
-
Size
518KB
-
MD5
0284ad037d53c56fb477e1df0a9fe8c4
-
SHA1
ee451b6b8d883bd3535c5523697093743d94813f
-
SHA256
b5797aaf9a2230a8703d9b814835822c8abc6da3fb5fe1435528964f713abbc4
-
SHA512
99eadb5596d66414e39e19cfd647c76f890d591b4d8ebf5b7606b53190d36fc0958460487ab5380cfebb2cbceaeb2a7a22a1ffbb7780c1d15ea60e219f17f682
-
SSDEEP
12288:wpmNumB0apppjNOwS/5tdptmistXV6vonqhcSPHgw6NG5GQ/RTp:oty3DcpiNShcS/gU1/R1
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-