General
-
Target
64b47fde027cfd04023331dcd19612933dc9b9d77731b487844c129d0d354b20.exe
-
Size
554KB
-
Sample
240418-bsgbzsgd31
-
MD5
678b937e3e7e02e6b27158a8ecc573ab
-
SHA1
e01f386b972ff55da1edb53ccda0bfd56e637477
-
SHA256
64b47fde027cfd04023331dcd19612933dc9b9d77731b487844c129d0d354b20
-
SHA512
8d7e2db2fa0b3d29dc02e3b8680847d698010e32ff0770664c86df1dd916f0f9e8cf261410941993fd20a0b2c110fb71223525c531b6b24c143e6ea0bea6fb34
-
SSDEEP
12288:MztjtvwaVSJISD40FENpOm4dCpc6o11I/qbMSlL+IjuhA3kR:avwaIOU40FEgdD6WK/qbMS5+GuhAi
Static task
static1
Behavioral task
behavioral1
Sample
64b47fde027cfd04023331dcd19612933dc9b9d77731b487844c129d0d354b20.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
64b47fde027cfd04023331dcd19612933dc9b9d77731b487844c129d0d354b20.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
lokibot
http://136.244.109.75/index.php/08409289280180
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
64b47fde027cfd04023331dcd19612933dc9b9d77731b487844c129d0d354b20.exe
-
Size
554KB
-
MD5
678b937e3e7e02e6b27158a8ecc573ab
-
SHA1
e01f386b972ff55da1edb53ccda0bfd56e637477
-
SHA256
64b47fde027cfd04023331dcd19612933dc9b9d77731b487844c129d0d354b20
-
SHA512
8d7e2db2fa0b3d29dc02e3b8680847d698010e32ff0770664c86df1dd916f0f9e8cf261410941993fd20a0b2c110fb71223525c531b6b24c143e6ea0bea6fb34
-
SSDEEP
12288:MztjtvwaVSJISD40FENpOm4dCpc6o11I/qbMSlL+IjuhA3kR:avwaIOU40FEgdD6WK/qbMS5+GuhAi
Score10/10-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing common artifacts observed in infostealers
-
Detects executables packed with SmartAssembly
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-