General
-
Target
ec4da0744db3c56c8c65da45b60e8082f53b8cbce1aee13eeff1562afbb45921.exe
-
Size
395KB
-
Sample
240416-bzdvfafh6z
-
MD5
9a6ceaa122950f56d8c208f6e734e9a0
-
SHA1
188b00e1d4ed31dfc7280b9d3334bb3cf54d012e
-
SHA256
ec4da0744db3c56c8c65da45b60e8082f53b8cbce1aee13eeff1562afbb45921
-
SHA512
2173cffce7413741e208fac7b777319da406b87b79d030deb12811b64bcff305991b0b0e31b0d24aca2f057481919df64dcfee10e877ff3c4fd977b7c1fad95d
-
SSDEEP
6144:qmijPECZwxTMr79U+dMewYCFJvMDxvacgN2DPAXhPDKdJsd7ubQ0K2SQeyai41ON:qmij8w/6ewXv8Lv8Xorsd7qQ0Vt78gF
Static task
static1
Behavioral task
behavioral1
Sample
ec4da0744db3c56c8c65da45b60e8082f53b8cbce1aee13eeff1562afbb45921.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec4da0744db3c56c8c65da45b60e8082f53b8cbce1aee13eeff1562afbb45921.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
lokibot
http://spencerstuartllc.top/document/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
ec4da0744db3c56c8c65da45b60e8082f53b8cbce1aee13eeff1562afbb45921.exe
-
Size
395KB
-
MD5
9a6ceaa122950f56d8c208f6e734e9a0
-
SHA1
188b00e1d4ed31dfc7280b9d3334bb3cf54d012e
-
SHA256
ec4da0744db3c56c8c65da45b60e8082f53b8cbce1aee13eeff1562afbb45921
-
SHA512
2173cffce7413741e208fac7b777319da406b87b79d030deb12811b64bcff305991b0b0e31b0d24aca2f057481919df64dcfee10e877ff3c4fd977b7c1fad95d
-
SSDEEP
6144:qmijPECZwxTMr79U+dMewYCFJvMDxvacgN2DPAXhPDKdJsd7ubQ0K2SQeyai41ON:qmij8w/6ewXv8Lv8Xorsd7qQ0Vt78gF
Score10/10-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing common artifacts observed in infostealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-