General
-
Target
e609540945ebef9d1596ca2b25b84c647093c5cd2739bd956d65d78b0b3aa7e7.exe
-
Size
555KB
-
Sample
240419-cjhn5aeh4t
-
MD5
99c5c9172ae14aef0cad5d0882e08e0a
-
SHA1
c60d974e2273922644892fac7100222d98345ca6
-
SHA256
e609540945ebef9d1596ca2b25b84c647093c5cd2739bd956d65d78b0b3aa7e7
-
SHA512
cb900ed675c41dcd5b68327c0812117998130f416313b219b7cc3c060a327033dca8000de4ab1c365b86d3868444a41af913c56c11525792f52d007ef7adb32d
-
SSDEEP
12288:b4nvyFxAgk/g7jFq81pds1N7SEwNLrzHBLA3B1ELYisAY3iuzCjkR:bFxDOiFqspdUN7HwNLP/snyuzC2
Static task
static1
Behavioral task
behavioral1
Sample
e609540945ebef9d1596ca2b25b84c647093c5cd2739bd956d65d78b0b3aa7e7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e609540945ebef9d1596ca2b25b84c647093c5cd2739bd956d65d78b0b3aa7e7.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
lokibot
http://24.199.107.111/index.php/720637
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
e609540945ebef9d1596ca2b25b84c647093c5cd2739bd956d65d78b0b3aa7e7.exe
-
Size
555KB
-
MD5
99c5c9172ae14aef0cad5d0882e08e0a
-
SHA1
c60d974e2273922644892fac7100222d98345ca6
-
SHA256
e609540945ebef9d1596ca2b25b84c647093c5cd2739bd956d65d78b0b3aa7e7
-
SHA512
cb900ed675c41dcd5b68327c0812117998130f416313b219b7cc3c060a327033dca8000de4ab1c365b86d3868444a41af913c56c11525792f52d007ef7adb32d
-
SSDEEP
12288:b4nvyFxAgk/g7jFq81pds1N7SEwNLrzHBLA3B1ELYisAY3iuzCjkR:bFxDOiFqspdUN7HwNLP/snyuzC2
Score10/10-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing common artifacts observed in infostealers
-
Detects executables packed with SmartAssembly
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-