General
-
Target
c49b74e2032051fc292bc1b3dfacc70c2b7051074c59de6f0d17929df10211cc_JC.exe
-
Size
517KB
-
Sample
231010-wr3h2shd74
-
MD5
20f562d14af01da92b246896e45e9459
-
SHA1
913ab9347907d99f19b7be0aa5ded7f586cb38a7
-
SHA256
c49b74e2032051fc292bc1b3dfacc70c2b7051074c59de6f0d17929df10211cc
-
SHA512
aa2512fa79058d9c06251dfb5db67e8077840a0766eefba89cdadc32a23e0b0035671a36ebe8e7911b8c5bbe1640c5a262b138c5c4b735f5742546df6878ae4e
-
SSDEEP
12288:eRdNALU7W25AktyWKvdZPrMd4NAx4NzWx87s9t:eJAGAkthgd90h2K87s9t
Static task
static1
Behavioral task
behavioral1
Sample
c49b74e2032051fc292bc1b3dfacc70c2b7051074c59de6f0d17929df10211cc_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c49b74e2032051fc292bc1b3dfacc70c2b7051074c59de6f0d17929df10211cc_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
lokibot
http://fresh1.ironoreprod.top/_errorpages/fresh1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
c49b74e2032051fc292bc1b3dfacc70c2b7051074c59de6f0d17929df10211cc_JC.exe
-
Size
517KB
-
MD5
20f562d14af01da92b246896e45e9459
-
SHA1
913ab9347907d99f19b7be0aa5ded7f586cb38a7
-
SHA256
c49b74e2032051fc292bc1b3dfacc70c2b7051074c59de6f0d17929df10211cc
-
SHA512
aa2512fa79058d9c06251dfb5db67e8077840a0766eefba89cdadc32a23e0b0035671a36ebe8e7911b8c5bbe1640c5a262b138c5c4b735f5742546df6878ae4e
-
SSDEEP
12288:eRdNALU7W25AktyWKvdZPrMd4NAx4NzWx87s9t:eJAGAkthgd90h2K87s9t
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-