General
-
Target
054527988476fbdfcca3d4eec4d530c5529e2360b3f84beab0578b1411cad952.exe
-
Size
359KB
-
Sample
240420-k85h7adc74
-
MD5
24899e0590707e01cd9fbdfab6dd922b
-
SHA1
ae88a813c9dd1d766134789052f1e8e1ecaeb4be
-
SHA256
054527988476fbdfcca3d4eec4d530c5529e2360b3f84beab0578b1411cad952
-
SHA512
1c514b5cccd7610260a52f8810c8bfe67c9c7d18d31a7fd1d85a1bb3ace5ff9e2212599653f323cf022a8c0d1f5a28bc8f32b59c87c4c9428fe7e852109c9f44
-
SSDEEP
6144:XUYNazqRCG5W3N95g8xzxr2RFx7+/3qrjTepYSUtKAhJMmo+g1R5E/meXvgDSgi8:EdzmloBxzxr2Rv7+CrHD5tlJyDnK/mek
Static task
static1
Behavioral task
behavioral1
Sample
054527988476fbdfcca3d4eec4d530c5529e2360b3f84beab0578b1411cad952.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
054527988476fbdfcca3d4eec4d530c5529e2360b3f84beab0578b1411cad952.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
lokibot
http://94.156.65.182/tomthf/cvghx/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
054527988476fbdfcca3d4eec4d530c5529e2360b3f84beab0578b1411cad952.exe
-
Size
359KB
-
MD5
24899e0590707e01cd9fbdfab6dd922b
-
SHA1
ae88a813c9dd1d766134789052f1e8e1ecaeb4be
-
SHA256
054527988476fbdfcca3d4eec4d530c5529e2360b3f84beab0578b1411cad952
-
SHA512
1c514b5cccd7610260a52f8810c8bfe67c9c7d18d31a7fd1d85a1bb3ace5ff9e2212599653f323cf022a8c0d1f5a28bc8f32b59c87c4c9428fe7e852109c9f44
-
SSDEEP
6144:XUYNazqRCG5W3N95g8xzxr2RFx7+/3qrjTepYSUtKAhJMmo+g1R5E/meXvgDSgi8:EdzmloBxzxr2Rv7+CrHD5tlJyDnK/mek
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-