Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2024 08:12
Static task
static1
Behavioral task
behavioral1
Sample
6dc6f63b7b1a593e209d062c877a488f.exe
Resource
win7-20240419-en
General
-
Target
6dc6f63b7b1a593e209d062c877a488f.exe
-
Size
822KB
-
MD5
6dc6f63b7b1a593e209d062c877a488f
-
SHA1
ff16670fc7957da27fb31f96ae17469a5125b720
-
SHA256
f9bd56989f51b598194cd551db59c95883628267a3f5ca8b87c0ad69fa7a3471
-
SHA512
df276f80da629c7ab78c1e913c88dc916a5564373dcf51961e4427e386612a5137ff2edbe97814dc8a4fe1499359e3779fdb46a309f7687208cae995a1f57327
-
SSDEEP
12288:jwglEe171o1+1k155scBRTWgwxPzsohPGLCPnXFzcoUd523GY7jVtC32LhYcdc45:WnNutGuPnX5c7d52WY/V4kc4/
Malware Config
Extracted
lokibot
http://ebnsina.top/evie1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
6dc6f63b7b1a593e209d062c877a488f.exedescription pid process target process PID 2028 set thread context of 1572 2028 6dc6f63b7b1a593e209d062c877a488f.exe 6dc6f63b7b1a593e209d062c877a488f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
6dc6f63b7b1a593e209d062c877a488f.exedescription pid process target process PID 2028 wrote to memory of 1572 2028 6dc6f63b7b1a593e209d062c877a488f.exe 6dc6f63b7b1a593e209d062c877a488f.exe PID 2028 wrote to memory of 1572 2028 6dc6f63b7b1a593e209d062c877a488f.exe 6dc6f63b7b1a593e209d062c877a488f.exe PID 2028 wrote to memory of 1572 2028 6dc6f63b7b1a593e209d062c877a488f.exe 6dc6f63b7b1a593e209d062c877a488f.exe PID 2028 wrote to memory of 1572 2028 6dc6f63b7b1a593e209d062c877a488f.exe 6dc6f63b7b1a593e209d062c877a488f.exe PID 2028 wrote to memory of 1572 2028 6dc6f63b7b1a593e209d062c877a488f.exe 6dc6f63b7b1a593e209d062c877a488f.exe PID 2028 wrote to memory of 1572 2028 6dc6f63b7b1a593e209d062c877a488f.exe 6dc6f63b7b1a593e209d062c877a488f.exe PID 2028 wrote to memory of 1572 2028 6dc6f63b7b1a593e209d062c877a488f.exe 6dc6f63b7b1a593e209d062c877a488f.exe PID 2028 wrote to memory of 1572 2028 6dc6f63b7b1a593e209d062c877a488f.exe 6dc6f63b7b1a593e209d062c877a488f.exe PID 2028 wrote to memory of 1572 2028 6dc6f63b7b1a593e209d062c877a488f.exe 6dc6f63b7b1a593e209d062c877a488f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dc6f63b7b1a593e209d062c877a488f.exe"C:\Users\Admin\AppData\Local\Temp\6dc6f63b7b1a593e209d062c877a488f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\6dc6f63b7b1a593e209d062c877a488f.exe"C:\Users\Admin\AppData\Local\Temp\6dc6f63b7b1a593e209d062c877a488f.exe"2⤵PID:1572
-