General
-
Target
c807a91d0b1e611e54592d3f9633b52e
-
Size
908KB
-
Sample
240314-h42kmafg96
-
MD5
c807a91d0b1e611e54592d3f9633b52e
-
SHA1
6c8e874441119c9f7c45f445cfc1e439fca73640
-
SHA256
7ec6b541616cc3f1fb1c458dd16f7edffff13a9b3c954d33442231ff38704c29
-
SHA512
65703716e91a79d84f0718320f7d40228e74cb9cbe81bd5b9b242151cc78f660f0dee394b6420acfcb5f0c12970b8fd72644cb29e8468e3d1678c81f9cd8dc03
-
SSDEEP
12288:8TXvOdgn5S6hWmsDc9F3nC0Py3gAhuDzUOF51UqiT7uWqYpALCnHBFe2lXpgUSIz:8YMBzdCqiTDqDAHSaXpjL+Sl
Static task
static1
Behavioral task
behavioral1
Sample
c807a91d0b1e611e54592d3f9633b52e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c807a91d0b1e611e54592d3f9633b52e.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
lokibot
http://zamloki.xyz/co/uo/BO.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
c807a91d0b1e611e54592d3f9633b52e
-
Size
908KB
-
MD5
c807a91d0b1e611e54592d3f9633b52e
-
SHA1
6c8e874441119c9f7c45f445cfc1e439fca73640
-
SHA256
7ec6b541616cc3f1fb1c458dd16f7edffff13a9b3c954d33442231ff38704c29
-
SHA512
65703716e91a79d84f0718320f7d40228e74cb9cbe81bd5b9b242151cc78f660f0dee394b6420acfcb5f0c12970b8fd72644cb29e8468e3d1678c81f9cd8dc03
-
SSDEEP
12288:8TXvOdgn5S6hWmsDc9F3nC0Py3gAhuDzUOF51UqiT7uWqYpALCnHBFe2lXpgUSIz:8YMBzdCqiTDqDAHSaXpjL+Sl
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-