General
-
Target
8eb0fdf0ff3b38ae84311b29effb0030a3b9a38430f7b8ee7918d2eb1301b12e.exe
-
Size
556KB
-
Sample
240418-b4actafe94
-
MD5
abcbfb3d531d8efece1fbe4a775ddc42
-
SHA1
6bd0e9ba6e9cb5940a746a798aa382d1ac4ad781
-
SHA256
8eb0fdf0ff3b38ae84311b29effb0030a3b9a38430f7b8ee7918d2eb1301b12e
-
SHA512
54e77b6c5dd70dd1384c1e2f512bc289431ab814ada3807c1602559cba736770f7110e2c01b47256a70b0f812bd8903e3cc15acee03b889ec2bea467c34e912a
-
SSDEEP
12288:8JSpOXGHT6O0SoGHndk4OVPw0WrZcKUXh5Mm0uY8jiup6kR:SRXmEInkV09qXhaK+upZ
Static task
static1
Behavioral task
behavioral1
Sample
8eb0fdf0ff3b38ae84311b29effb0030a3b9a38430f7b8ee7918d2eb1301b12e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8eb0fdf0ff3b38ae84311b29effb0030a3b9a38430f7b8ee7918d2eb1301b12e.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
lokibot
http://136.244.109.75/index.php/690877741063
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
8eb0fdf0ff3b38ae84311b29effb0030a3b9a38430f7b8ee7918d2eb1301b12e.exe
-
Size
556KB
-
MD5
abcbfb3d531d8efece1fbe4a775ddc42
-
SHA1
6bd0e9ba6e9cb5940a746a798aa382d1ac4ad781
-
SHA256
8eb0fdf0ff3b38ae84311b29effb0030a3b9a38430f7b8ee7918d2eb1301b12e
-
SHA512
54e77b6c5dd70dd1384c1e2f512bc289431ab814ada3807c1602559cba736770f7110e2c01b47256a70b0f812bd8903e3cc15acee03b889ec2bea467c34e912a
-
SSDEEP
12288:8JSpOXGHT6O0SoGHndk4OVPw0WrZcKUXh5Mm0uY8jiup6kR:SRXmEInkV09qXhaK+upZ
Score10/10-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing common artifacts observed in infostealers
-
Detects executables packed with SmartAssembly
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-