General
-
Target
913f2f9a1131b26bb6afcc715fc914b5ead5c2a4ffc91a3d19e51292ab3be1ca.exe
-
Size
395KB
-
Sample
240417-q7da7saf35
-
MD5
60c8e751c1caee5b01cc878231fea5f4
-
SHA1
d7bc61e04f58e428658d3ce86461ceadf2019548
-
SHA256
913f2f9a1131b26bb6afcc715fc914b5ead5c2a4ffc91a3d19e51292ab3be1ca
-
SHA512
45a7f0dbb7e9ebcdad9e834fe6156590e98d776db78426b2ddb2529b92c554584f4433d09de7405e36342b836d95693fccd372f1049bc4166f5078f8b3922241
-
SSDEEP
6144:WmijPECZwxTMr79U+dykVFJvMDxvacgN2DPAXhPDKdJsd7uUQ0KDOSrrW4iAHlZR:Wmij8w/Mkxv8Lv8Xorsd71Q0IO0r/F
Static task
static1
Behavioral task
behavioral1
Sample
913f2f9a1131b26bb6afcc715fc914b5ead5c2a4ffc91a3d19e51292ab3be1ca.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
913f2f9a1131b26bb6afcc715fc914b5ead5c2a4ffc91a3d19e51292ab3be1ca.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
lokibot
http://spencerstuartllc.top/document/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
913f2f9a1131b26bb6afcc715fc914b5ead5c2a4ffc91a3d19e51292ab3be1ca.exe
-
Size
395KB
-
MD5
60c8e751c1caee5b01cc878231fea5f4
-
SHA1
d7bc61e04f58e428658d3ce86461ceadf2019548
-
SHA256
913f2f9a1131b26bb6afcc715fc914b5ead5c2a4ffc91a3d19e51292ab3be1ca
-
SHA512
45a7f0dbb7e9ebcdad9e834fe6156590e98d776db78426b2ddb2529b92c554584f4433d09de7405e36342b836d95693fccd372f1049bc4166f5078f8b3922241
-
SSDEEP
6144:WmijPECZwxTMr79U+dykVFJvMDxvacgN2DPAXhPDKdJsd7uUQ0KDOSrrW4iAHlZR:Wmij8w/Mkxv8Lv8Xorsd71Q0IO0r/F
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-