General
-
Target
bf327ffef0750806f9859daa14059332
-
Size
633KB
-
Sample
240310-24d9waea3v
-
MD5
bf327ffef0750806f9859daa14059332
-
SHA1
a0898420ed4f1603b4d47c4a6739bfe4eb70ed08
-
SHA256
7c0e433d668ff35e293ce8ad4056674c7948728c54c8b829aa37742e22e12c53
-
SHA512
ad6648ffcf5c551548a3471c859b4e6d69e971f0beded2b982611eefeee985af5460bb5994d2a4a748eaa6539c20b45d51a679847356945b5d842d94f842d83c
-
SSDEEP
12288:pEjPU9GPU9iC1IUMQKTLgSOsBgo0q4wMalPY5OJsH52BYk9vQoIA1F60Kpspp0FB:pEngSOsBgo0q4wMqP0OmIdj1F/K4WF
Static task
static1
Behavioral task
behavioral1
Sample
bf327ffef0750806f9859daa14059332.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bf327ffef0750806f9859daa14059332.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
lokibot
http://apponline354.ir/kiriko/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
bf327ffef0750806f9859daa14059332
-
Size
633KB
-
MD5
bf327ffef0750806f9859daa14059332
-
SHA1
a0898420ed4f1603b4d47c4a6739bfe4eb70ed08
-
SHA256
7c0e433d668ff35e293ce8ad4056674c7948728c54c8b829aa37742e22e12c53
-
SHA512
ad6648ffcf5c551548a3471c859b4e6d69e971f0beded2b982611eefeee985af5460bb5994d2a4a748eaa6539c20b45d51a679847356945b5d842d94f842d83c
-
SSDEEP
12288:pEjPU9GPU9iC1IUMQKTLgSOsBgo0q4wMalPY5OJsH52BYk9vQoIA1F60Kpspp0FB:pEngSOsBgo0q4wMqP0OmIdj1F/K4WF
Score10/10-
CustAttr .NET packer
Detects CustAttr .NET packer in memory.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-