General
-
Target
5ffa345944786c7b505a3b1b3392560b1b987529c49e11893642c8be816aa313.exe
-
Size
590KB
-
Sample
240418-br59qagd2y
-
MD5
742b63d93401a9af88183725ee503df3
-
SHA1
ecfb96a3f57aee691a1c80a750518f39a8cbc474
-
SHA256
5ffa345944786c7b505a3b1b3392560b1b987529c49e11893642c8be816aa313
-
SHA512
713a629070a15990f1eaa70368bfa891ab3b736060c129ef689ecc8fd3bc5119de7379e71e272cf05d1fa50c73a68edb92a316a0507ee759e91d939d7b4af9b1
-
SSDEEP
12288:tGL21ILq9J2cWjoIa8JnjoQ/huW2YxUlbODcOYNSddW4Jf5CoXkR:ML21ILq9JrAa8RjDwLYxN4NGNfS
Static task
static1
Behavioral task
behavioral1
Sample
5ffa345944786c7b505a3b1b3392560b1b987529c49e11893642c8be816aa313.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5ffa345944786c7b505a3b1b3392560b1b987529c49e11893642c8be816aa313.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
lokibot
http://24.199.107.111/index.php/0672554332862
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
5ffa345944786c7b505a3b1b3392560b1b987529c49e11893642c8be816aa313.exe
-
Size
590KB
-
MD5
742b63d93401a9af88183725ee503df3
-
SHA1
ecfb96a3f57aee691a1c80a750518f39a8cbc474
-
SHA256
5ffa345944786c7b505a3b1b3392560b1b987529c49e11893642c8be816aa313
-
SHA512
713a629070a15990f1eaa70368bfa891ab3b736060c129ef689ecc8fd3bc5119de7379e71e272cf05d1fa50c73a68edb92a316a0507ee759e91d939d7b4af9b1
-
SSDEEP
12288:tGL21ILq9J2cWjoIa8JnjoQ/huW2YxUlbODcOYNSddW4Jf5CoXkR:ML21ILq9JrAa8RjDwLYxN4NGNfS
Score10/10-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing common artifacts observed in infostealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-