General
-
Target
7d1ecdb6f4825c42fd25d761f94b4b9b460c8da0f5e7b84b7b8b4fbf25c690ff_JC.exe
-
Size
560KB
-
Sample
231010-1d16aaed43
-
MD5
7c6259d70d7b10251e0a0f9931033863
-
SHA1
6ec330fdb52cbb785d57ca0427e8e3996f387204
-
SHA256
7d1ecdb6f4825c42fd25d761f94b4b9b460c8da0f5e7b84b7b8b4fbf25c690ff
-
SHA512
49737cf7721b4f8647dfe2e2a12019f3e213fee140919dac0c85c55e7a73210c77d111477ce356dd5c33bb6807b6d3d6ee581de6b871fd20e1f228f3862c56d2
-
SSDEEP
12288:BcsAckjMIawDkafuMPo6TM/5QIaLPbvxgwnFz:xkAMkfIo6umdn+wF
Static task
static1
Behavioral task
behavioral1
Sample
7d1ecdb6f4825c42fd25d761f94b4b9b460c8da0f5e7b84b7b8b4fbf25c690ff_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7d1ecdb6f4825c42fd25d761f94b4b9b460c8da0f5e7b84b7b8b4fbf25c690ff_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
lokibot
http://45.77.76.224/~clinics/uhjaX1tXloDzACvaR
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
7d1ecdb6f4825c42fd25d761f94b4b9b460c8da0f5e7b84b7b8b4fbf25c690ff_JC.exe
-
Size
560KB
-
MD5
7c6259d70d7b10251e0a0f9931033863
-
SHA1
6ec330fdb52cbb785d57ca0427e8e3996f387204
-
SHA256
7d1ecdb6f4825c42fd25d761f94b4b9b460c8da0f5e7b84b7b8b4fbf25c690ff
-
SHA512
49737cf7721b4f8647dfe2e2a12019f3e213fee140919dac0c85c55e7a73210c77d111477ce356dd5c33bb6807b6d3d6ee581de6b871fd20e1f228f3862c56d2
-
SSDEEP
12288:BcsAckjMIawDkafuMPo6TM/5QIaLPbvxgwnFz:xkAMkfIo6umdn+wF
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-