General
-
Target
383d288ea4bf2dd4f9363d8990b1c348.bin
-
Size
459KB
-
Sample
231101-bln39aae37
-
MD5
ce08bc3a12a85365b3c539f7e809812b
-
SHA1
a17297e5b91ff39d55dd9ab9ee7956e14eb4d7a9
-
SHA256
76163915722defb969b21e3a9c6e5abc6b00cf49fb29a2c015d8bc6aa1d00644
-
SHA512
bb4cc1c11fc19ed577035b47b5eb502200f4510a817d4e57c57cadcc808d02036223bfe4a550588dfc86ecee3ea671171bf0337e67ac0398da6384c00a2139c0
-
SSDEEP
12288:8aQXEKok6l8ivkd+stYWtmjmY1OeKStJ0:sXExkMv+BtQjwe9t6
Static task
static1
Behavioral task
behavioral1
Sample
25f9c6802d033da45292618209f2ff7ca03c3207f1705e102e69f698584906b4.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
25f9c6802d033da45292618209f2ff7ca03c3207f1705e102e69f698584906b4.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
lokibot
https://sempersim.su/a16/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
25f9c6802d033da45292618209f2ff7ca03c3207f1705e102e69f698584906b4.exe
-
Size
912KB
-
MD5
383d288ea4bf2dd4f9363d8990b1c348
-
SHA1
53e6d1699c1b525d16bd29b2763f01b8e5fbe6f1
-
SHA256
25f9c6802d033da45292618209f2ff7ca03c3207f1705e102e69f698584906b4
-
SHA512
c874086eb319d62480423f16bc335bdd2618795567c25b06feec9642d733e252456580c884542e818052ad37b6d349e115f8a127422c4e57944dde3ea5a8c6bd
-
SSDEEP
12288:VJbylGp7515CtZXEiQq5cFH5b205sFpp:VJw67515CtbFcFVRsF
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-