General
-
Target
Final_Test.pdf
-
Size
530KB
-
Sample
240421-tt68xaeh93
-
MD5
ce6ba3df1d57ade7830c5315d77c9311
-
SHA1
251e75ac4468d26f76eaa9fe6458e169d3757dd4
-
SHA256
ce8bbc09521bc9bd7a358e4fbbe370962e22b91a78c8d895716ef98a1daaaf77
-
SHA512
b35cd30bd0ed8a4faab706ec0ec0c5c2494764f5a4a8f6cf416341f868a257e54f8d0ecbfd6523f3fc42fc914dd487a5cc14d86f433a8c5ae8775e131f4c50e6
-
SSDEEP
12288:0/dqneaMkgoWOtT1oslIRJUfLKvxMiFS9/j+esTCmuPcB:0/dqe1PoZt5HMgLo2micB
Static task
static1
Behavioral task
behavioral1
Sample
Final_Test.exe
Resource
win10-20240404-en
Malware Config
Extracted
lokibot
http://meta-mim.in/wp-includes/js/pzy/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
netwire
iheuche009.hopto.org:1199
-
activex_autorun
true
-
activex_key
{84B0DIYX-PC63-6D34-570T-YW54Q1M2RH7A}
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
IRobWUAG
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
Avast
-
use_mutex
true
Targets
-
-
Target
Final_Test.pdf
-
Size
530KB
-
MD5
ce6ba3df1d57ade7830c5315d77c9311
-
SHA1
251e75ac4468d26f76eaa9fe6458e169d3757dd4
-
SHA256
ce8bbc09521bc9bd7a358e4fbbe370962e22b91a78c8d895716ef98a1daaaf77
-
SHA512
b35cd30bd0ed8a4faab706ec0ec0c5c2494764f5a4a8f6cf416341f868a257e54f8d0ecbfd6523f3fc42fc914dd487a5cc14d86f433a8c5ae8775e131f4c50e6
-
SSDEEP
12288:0/dqneaMkgoWOtT1oslIRJUfLKvxMiFS9/j+esTCmuPcB:0/dqe1PoZt5HMgLo2micB
-
NetWire RAT payload
-
Modifies Installed Components in the registry
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-