General
-
Target
HAESU KOREA PAYMENT 20231003pdf.exe
-
Size
540KB
-
Sample
231003-ld2pgshf4z
-
MD5
6a7033f14b1e8160994193dc7bd2004d
-
SHA1
1438692aa2c983667aec0edaf679396925d7f0b4
-
SHA256
616936befc6956ed76300f793de7f3954a102733b534b020060168cf711e53a9
-
SHA512
c8a95ceee7cc8b2b0acb53131a9e175cd148e32a83e8d36ace32a97749e9b880a06a40ee18528b4bb1e927165ac7f7cdb85d577438b921d21a8c9b67e6f13ef8
-
SSDEEP
12288:snP2iSAx5PWPQCkzqi29HSoVo3FwQRRKejkrsGTEKR:snO7Ax5uPKX29HhyXuemsME
Static task
static1
Behavioral task
behavioral1
Sample
HAESU KOREA PAYMENT 20231003pdf.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
HAESU KOREA PAYMENT 20231003pdf.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
lokibot
http://fresh1.ironoreprod.top/_errorpages/fresh1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
HAESU KOREA PAYMENT 20231003pdf.exe
-
Size
540KB
-
MD5
6a7033f14b1e8160994193dc7bd2004d
-
SHA1
1438692aa2c983667aec0edaf679396925d7f0b4
-
SHA256
616936befc6956ed76300f793de7f3954a102733b534b020060168cf711e53a9
-
SHA512
c8a95ceee7cc8b2b0acb53131a9e175cd148e32a83e8d36ace32a97749e9b880a06a40ee18528b4bb1e927165ac7f7cdb85d577438b921d21a8c9b67e6f13ef8
-
SSDEEP
12288:snP2iSAx5PWPQCkzqi29HSoVo3FwQRRKejkrsGTEKR:snO7Ax5uPKX29HhyXuemsME
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-