General
-
Target
f3edc4eca9b587cd1c25d034cf2d4c28e7caf604f90a3b1b6fb34da036de6de7
-
Size
492KB
-
Sample
240417-qywq7aaa53
-
MD5
0bb49a2af625059a8a6ea6376d747720
-
SHA1
adc38fb22ef96e5b026fc75d88fd20e080a1bb72
-
SHA256
f3edc4eca9b587cd1c25d034cf2d4c28e7caf604f90a3b1b6fb34da036de6de7
-
SHA512
d8cf5fbf6b3c97826291be368bc93c41b97ee451bec193e852880089dd44cac51ff942c2cdbb922bebcc9a362a60d15ffd1b60ef03c823877987904b1475ce2e
-
SSDEEP
12288:86uXMYL1oQMojh2PkfrL/Jb54LnkXDBIdVwLLhpWl9rk:86uZL1JMC9rLRN4LkXDJRUk
Static task
static1
Behavioral task
behavioral1
Sample
fd2d0fbf84a26d2dbf9b64e57c4acef804d83eb2c5b10273c1642f9e8ef7db47.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fd2d0fbf84a26d2dbf9b64e57c4acef804d83eb2c5b10273c1642f9e8ef7db47.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
lokibot
https://sempersim.su/c13/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
fd2d0fbf84a26d2dbf9b64e57c4acef804d83eb2c5b10273c1642f9e8ef7db47.exe
-
Size
561KB
-
MD5
2e53a8a38c736fe1f0f4c68b5d0bb3f4
-
SHA1
885c51f3c9189f89d1d5470279d61619165a3793
-
SHA256
fd2d0fbf84a26d2dbf9b64e57c4acef804d83eb2c5b10273c1642f9e8ef7db47
-
SHA512
b579fc70131b9f2820749b259436a02bc837af210bb8b33acfdd812731cf5d68c0e6eb71846a7f2e112607adfa83f745840a7e4c3a627cff5fdb744ead627cc8
-
SSDEEP
12288:kCXCRa5WPw8w07xLNl/5ANKgaHfexlJvuToZ93IbmlFJYCHdDlY:bXCjo67pv1PHfKmTuhJYC9
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-