General
-
Target
bf0a1193f64b5b16b5ccb957c93d8ee4
-
Size
1006KB
-
Sample
240310-tqtteaga43
-
MD5
bf0a1193f64b5b16b5ccb957c93d8ee4
-
SHA1
b04a3d530cf177b2ecdca4a23eb3fceed1e7a9c2
-
SHA256
07a269d06679e6c3c0e2eda7d42c707b8d3da60a332cc86f2bee9b3c444c97a8
-
SHA512
51ef5b40bc9b222f4714c26f9999cdd0636cdbe388339ef76f2ad355a08fdda71a66985694399d958a499be9a26ab45e813281ceb686695fe3a0a6dc85dbe7d4
-
SSDEEP
24576:gyICo8qJYDB5/dTZK64JjWmPQVIBoogfQbwQg:eCb/rK64J6mkqOQbwQ
Static task
static1
Behavioral task
behavioral1
Sample
bf0a1193f64b5b16b5ccb957c93d8ee4.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
bf0a1193f64b5b16b5ccb957c93d8ee4.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
lokibot
http://manvim.co/fd5/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
bf0a1193f64b5b16b5ccb957c93d8ee4
-
Size
1006KB
-
MD5
bf0a1193f64b5b16b5ccb957c93d8ee4
-
SHA1
b04a3d530cf177b2ecdca4a23eb3fceed1e7a9c2
-
SHA256
07a269d06679e6c3c0e2eda7d42c707b8d3da60a332cc86f2bee9b3c444c97a8
-
SHA512
51ef5b40bc9b222f4714c26f9999cdd0636cdbe388339ef76f2ad355a08fdda71a66985694399d958a499be9a26ab45e813281ceb686695fe3a0a6dc85dbe7d4
-
SSDEEP
24576:gyICo8qJYDB5/dTZK64JjWmPQVIBoogfQbwQg:eCb/rK64J6mkqOQbwQ
Score10/10-
CustAttr .NET packer
Detects CustAttr .NET packer in memory.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-