General
-
Target
c873e64883d546ff82294aa67a5107fc
-
Size
540KB
-
Sample
240314-m2tt8aab9v
-
MD5
c873e64883d546ff82294aa67a5107fc
-
SHA1
a2b1dbc01de6528050adae0b64010b836f27861e
-
SHA256
b07192037942ceea5360cf10c7d0d6ca370b94ff385852d2da746ca080bad6aa
-
SHA512
ad7c884bbec9ce426d3787cd4c6af488096c5b3f7f2c27820a8578ccd50ea2874947af27b4a8dba43c6f9c6f50d0b706be6bb757aa417fb69d354c50a162fcd8
-
SSDEEP
12288:mR+GL/IGw+5gcoJOIv4OwqrkRlqqMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM+Mt:aPIGaccOywv7qqMMMMMMMMMMMMMMMMMb
Static task
static1
Behavioral task
behavioral1
Sample
c873e64883d546ff82294aa67a5107fc.exe
Resource
win7-20240220-en
Malware Config
Extracted
lokibot
http://185.227.139.5/sxisodifntose.php/yfNQXpqQZjJcw
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
c873e64883d546ff82294aa67a5107fc
-
Size
540KB
-
MD5
c873e64883d546ff82294aa67a5107fc
-
SHA1
a2b1dbc01de6528050adae0b64010b836f27861e
-
SHA256
b07192037942ceea5360cf10c7d0d6ca370b94ff385852d2da746ca080bad6aa
-
SHA512
ad7c884bbec9ce426d3787cd4c6af488096c5b3f7f2c27820a8578ccd50ea2874947af27b4a8dba43c6f9c6f50d0b706be6bb757aa417fb69d354c50a162fcd8
-
SSDEEP
12288:mR+GL/IGw+5gcoJOIv4OwqrkRlqqMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM+Mt:aPIGaccOywv7qqMMMMMMMMMMMMMMMMMb
-
Detect ZGRat V1
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-