General
-
Target
972ef638b803266c9fe4afce93a2f0a4a2a880b7a93a6c250209c55dea295ee0
-
Size
990KB
-
Sample
240510-jwm8psfb55
-
MD5
9de9a50ec8399bcbea1697aed7f6b093
-
SHA1
71997994585f06160d84ac92555b2eadaacfaed3
-
SHA256
972ef638b803266c9fe4afce93a2f0a4a2a880b7a93a6c250209c55dea295ee0
-
SHA512
c717604050139d6d7579ae90ebaf201f4f615c75b69163c2f0720ebe23448e6c8e88e1e91c8732ce6b4a2ff569e4c43e8e6d1fd09a148607ebbb75c9244fad3c
-
SSDEEP
24576:7xlH0Rs/OSeKVTzAd9zpthYjMNuZ+FOPSKs0:NlH0Rs/OSes8NthYjMNuZ+FOPSK
Static task
static1
Behavioral task
behavioral1
Sample
972ef638b803266c9fe4afce93a2f0a4a2a880b7a93a6c250209c55dea295ee0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
972ef638b803266c9fe4afce93a2f0a4a2a880b7a93a6c250209c55dea295ee0.exe
Resource
win11-20240426-en
Malware Config
Extracted
lokibot
http://195.123.211.210/evie1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
972ef638b803266c9fe4afce93a2f0a4a2a880b7a93a6c250209c55dea295ee0
-
Size
990KB
-
MD5
9de9a50ec8399bcbea1697aed7f6b093
-
SHA1
71997994585f06160d84ac92555b2eadaacfaed3
-
SHA256
972ef638b803266c9fe4afce93a2f0a4a2a880b7a93a6c250209c55dea295ee0
-
SHA512
c717604050139d6d7579ae90ebaf201f4f615c75b69163c2f0720ebe23448e6c8e88e1e91c8732ce6b4a2ff569e4c43e8e6d1fd09a148607ebbb75c9244fad3c
-
SSDEEP
24576:7xlH0Rs/OSeKVTzAd9zpthYjMNuZ+FOPSKs0:NlH0Rs/OSes8NthYjMNuZ+FOPSK
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-