General
-
Target
14574936532.zip
-
Size
372KB
-
Sample
240430-y8tzcaha79
-
MD5
eae12d61710fffcb6368a5b37e94e212
-
SHA1
bc66029cc36c623a2816a9a6f87dd081a3161e89
-
SHA256
3ab84a91cdd6484afa41b0b99d3e365ba288db5c6e2487b38638c1209cbc0661
-
SHA512
7058feaea52a4277edba0559d9d034d498ba0c0431ac9b0c32efae691b3e5adc86b4150872373cc794796a13ba25b9f0f90171a565d5ab9bbe6aadf5ee24f8f7
-
SSDEEP
6144:JMAEOThVdagU/7tezi95kGZ+T4Y3nuu9zSd9J0zDphKLYD/m8MAzENnunltsN1Ta:NfTLEgZoSo+TB3nuWSdj0zFA0uAwnIlJ
Static task
static1
Behavioral task
behavioral1
Sample
004cc0803bb20bd71c217c0a7987420f3b6fffec022b6c1c1f20b87b86b1de9c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
004cc0803bb20bd71c217c0a7987420f3b6fffec022b6c1c1f20b87b86b1de9c.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
lokibot
http://63.250.44.84/cpanel.php?id=0154721716286636215019717878850975448529
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
004cc0803bb20bd71c217c0a7987420f3b6fffec022b6c1c1f20b87b86b1de9c
-
Size
404KB
-
MD5
4bdd7d8d5654613006b106e800fef483
-
SHA1
d7ae5aa54cad9ffd8a7d2573e5eba2279cfa17c9
-
SHA256
004cc0803bb20bd71c217c0a7987420f3b6fffec022b6c1c1f20b87b86b1de9c
-
SHA512
f7310d21eff0700b0638768b4134ea0f43af634f7265eb20020a2759522fe83038d4c42ef30f44854a3e618808b2b9950da60898b357c151b060f67fc7045d5b
-
SSDEEP
12288:PcI07ouHH1J+0wSocWeSG4Z5wKjpJqszz2R1g0:EYu1xocWhzwqPH2R1
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-