General
-
Target
92f18cfa658c4279fd7e00a15ec63ca51eae49c217fe62b1c40443e144347728
-
Size
534KB
-
Sample
240417-qy28zabf4t
-
MD5
973bb12c4a6deb9c258a30204485d310
-
SHA1
2900a2fc75a2f9a7b7bf9d3a41825c05051db7dd
-
SHA256
92f18cfa658c4279fd7e00a15ec63ca51eae49c217fe62b1c40443e144347728
-
SHA512
9b263b1d51aed5ea66a478e7546b25c40f8cbc979e99c6f3197781da090d383435e74bc75f187cb62205d12d71c7d4b332fa4d7c04ed564f15ba6d4636abda47
-
SSDEEP
12288:+yl5z+xLpPHtPCP7d6PY3XS5kLgqkb6b8Uc9hTUfoCgZYy/:N5z+1pPNPAxWki5rR2bATUwCRy/
Behavioral task
behavioral1
Sample
e20cf5c319fe815eb1845556289e56f8c3241019a907adb6f4a33e8dc9ecab59.exe
Resource
win7-20240221-en
Malware Config
Extracted
lokibot
http://sempersim.su/c19/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
e20cf5c319fe815eb1845556289e56f8c3241019a907adb6f4a33e8dc9ecab59.exe
-
Size
559KB
-
MD5
f13f9ca5ede930df8310e504372ca4e5
-
SHA1
bd28bfbb2472cd7f66be9cfcc11b77c17d08cec7
-
SHA256
e20cf5c319fe815eb1845556289e56f8c3241019a907adb6f4a33e8dc9ecab59
-
SHA512
ffe9fc1378bd084fa785c2d9361c32dcc740355d208b425647b3a0e5b02f8040154e60595e62c8100728ed4ded99c1d9ce3c69de3a8ce4226d50be0c5955850a
-
SSDEEP
12288:CsHzOUNUSB/o5LsI1uwajJ5yvv1l2ihNYL+58d2:ViUmSB/o5d1ubcvvu+502
-
Accesses Microsoft Outlook profiles
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-