General
-
Target
b3bb12ae88279341ff46626660249155b11effa41f3389ace07f4aa6f1045f8c.exe
-
Size
368KB
-
Sample
240423-b5c54abb65
-
MD5
c4b632f0468dae6a10b67d50a2f6e322
-
SHA1
ca3a42cb757d86d86c2859b2a5d5250d857128c3
-
SHA256
b3bb12ae88279341ff46626660249155b11effa41f3389ace07f4aa6f1045f8c
-
SHA512
7113e3cd8e732dc89da73d81e186cc026364588a7abe36f65ba05a28fc2f56bce72083b0fcd692f0495e897feaafeffdb53d761727a0fd0288fe5cecb5451edf
-
SSDEEP
6144:k4651c9nt3FAIHysm374mPKHCZukBsbh3Wnb22X3ASFL5TrJ9D0+L8wu2+gI:RZ7F1y5hcW+sbxQeL5TrD0+L8wu2+9
Static task
static1
Behavioral task
behavioral1
Sample
b3bb12ae88279341ff46626660249155b11effa41f3389ace07f4aa6f1045f8c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b3bb12ae88279341ff46626660249155b11effa41f3389ace07f4aa6f1045f8c.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
lokibot
http://91.92.253.228/tjmkdc/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
b3bb12ae88279341ff46626660249155b11effa41f3389ace07f4aa6f1045f8c.exe
-
Size
368KB
-
MD5
c4b632f0468dae6a10b67d50a2f6e322
-
SHA1
ca3a42cb757d86d86c2859b2a5d5250d857128c3
-
SHA256
b3bb12ae88279341ff46626660249155b11effa41f3389ace07f4aa6f1045f8c
-
SHA512
7113e3cd8e732dc89da73d81e186cc026364588a7abe36f65ba05a28fc2f56bce72083b0fcd692f0495e897feaafeffdb53d761727a0fd0288fe5cecb5451edf
-
SSDEEP
6144:k4651c9nt3FAIHysm374mPKHCZukBsbh3Wnb22X3ASFL5TrJ9D0+L8wu2+gI:RZ7F1y5hcW+sbxQeL5TrD0+L8wu2+9
Score10/10-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing common artifacts observed in infostealers
-
Detects executables packed with ConfuserEx Mod
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-