General
-
Target
8f9848ad1675d8ce89d47d7d017b8b29df76ad3af2c8f7b7046d94789d9fdb20
-
Size
518KB
-
Sample
240417-qyxngsaa56
-
MD5
6b6f1b4a8b07f16d9575a27a87818b4a
-
SHA1
0e8268865df19bd525ddf373e4fe7207fc07eaa9
-
SHA256
8f9848ad1675d8ce89d47d7d017b8b29df76ad3af2c8f7b7046d94789d9fdb20
-
SHA512
b873916cd89589fdb99f44dfc4c58ec98c7c1a2b3f2a20eaac4739dc6017a123346e45e438eb3eb929b715cf224d4bda489bc9a9f8bf8a95531a7b00958dc2a7
-
SSDEEP
12288:O14JuiGopPGJG7vY3gVtRCGp65diFEsHHM1+ZA7K:W40i7N7vYQfRbpTFxHsZK
Static task
static1
Behavioral task
behavioral1
Sample
fbed0af892e58c844c0d37e6c68e979b8dbb94b5d6a95876a7cd38e0f0172478.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fbed0af892e58c844c0d37e6c68e979b8dbb94b5d6a95876a7cd38e0f0172478.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
lokibot
http://www.dobiamfollollc.online:3777/vogxhf/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
fbed0af892e58c844c0d37e6c68e979b8dbb94b5d6a95876a7cd38e0f0172478.exe
-
Size
926KB
-
MD5
01bad75f225c4d649c47a64beefa2881
-
SHA1
d09fe85240d957304db1201a850c9c8de594bc43
-
SHA256
fbed0af892e58c844c0d37e6c68e979b8dbb94b5d6a95876a7cd38e0f0172478
-
SHA512
4b6bec085cc68cde8526c0c637523c10f77ad6b5fd98c529f2592eedb5c75e3d19312157361eac1ac9629d639267d660d7de073a6b4a54c8c4021aeab4c72acd
-
SSDEEP
12288:Dtb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgazP2bDhRBmPU6A:Dtb20pkaCqT5TBWgNQ7azuXXBmU6A
Score10/10-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-