General
-
Target
87e331c4dd791e6e0a66c1e56d8cefec.bin
-
Size
515KB
-
Sample
240420-bvbvaacg82
-
MD5
670038c453b29b867e4b2ac236197b56
-
SHA1
c40a4e6af79d27333c58fe6e300334a92f4bc45f
-
SHA256
6ad5b5cd38256f61191c86f66a967b5da9648c8696322b97246b56d1adb17b79
-
SHA512
0c6b16f61e063aa5cb2e55507be3497cbf6430362ee2444e7a6862be0fe7d36fc70a7462e307f7ccd135862d220d1c4d70bce7b0ea723f8db04b52de36831337
-
SSDEEP
12288:zAuklBBQ71BalyvWptL9+yogt9WrIiH6w0:M5wilCWptZghrXaw0
Static task
static1
Behavioral task
behavioral1
Sample
Payment Advice_16007618765.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Payment Advice_16007618765.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
lokibot
http://24.199.107.111/index.php/0672554332862
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Payment Advice_16007618765.exe
-
Size
590KB
-
MD5
742b63d93401a9af88183725ee503df3
-
SHA1
ecfb96a3f57aee691a1c80a750518f39a8cbc474
-
SHA256
5ffa345944786c7b505a3b1b3392560b1b987529c49e11893642c8be816aa313
-
SHA512
713a629070a15990f1eaa70368bfa891ab3b736060c129ef689ecc8fd3bc5119de7379e71e272cf05d1fa50c73a68edb92a316a0507ee759e91d939d7b4af9b1
-
SSDEEP
12288:tGL21ILq9J2cWjoIa8JnjoQ/huW2YxUlbODcOYNSddW4Jf5CoXkR:ML21ILq9JrAa8RjDwLYxN4NGNfS
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-