General
-
Target
Payment Advice_16007618765_1.rar
-
Size
514KB
-
Sample
240418-z17e5sfa38
-
MD5
87e331c4dd791e6e0a66c1e56d8cefec
-
SHA1
b44e8463560a4e56480f42b67d278871851a5355
-
SHA256
4a49338d1093a91cb0176df46341dea8afa65b6c2244118b14ddb5fb554a7735
-
SHA512
8f6cc5e26f0a44f46c5793c9e871e9f2bcae2aa53ca243f167b093d5b8633770468f785cd841a8b8e98020232be1c8dec05bf2dd69523700f2ebdaf28dcf4ae7
-
SSDEEP
12288:RJso+jCJ0wfs/26JkoJvLJOtOLf058JfNLWllwMtPJK+8/4uVqKy2rfRNJDEcG:Cy0wfsVlJD8tOLGEfQ7BI14eq92r/lEt
Static task
static1
Behavioral task
behavioral1
Sample
Payment Advice_16007618765.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Payment Advice_16007618765.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
lokibot
http://24.199.107.111/index.php/0672554332862
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Payment Advice_16007618765.exe
-
Size
590KB
-
MD5
742b63d93401a9af88183725ee503df3
-
SHA1
ecfb96a3f57aee691a1c80a750518f39a8cbc474
-
SHA256
5ffa345944786c7b505a3b1b3392560b1b987529c49e11893642c8be816aa313
-
SHA512
713a629070a15990f1eaa70368bfa891ab3b736060c129ef689ecc8fd3bc5119de7379e71e272cf05d1fa50c73a68edb92a316a0507ee759e91d939d7b4af9b1
-
SSDEEP
12288:tGL21ILq9J2cWjoIa8JnjoQ/huW2YxUlbODcOYNSddW4Jf5CoXkR:ML21ILq9JrAa8RjDwLYxN4NGNfS
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-