General
-
Target
c3338e8d8bb652e897c624f3380e1432eb1c4c93091b64dd28abc3cfa02fa804.exe
-
Size
990KB
-
Sample
240510-kqn4gsdd8z
-
MD5
ccfc8289ea1ad3acab95de0c1e65eb2c
-
SHA1
b38ece908f2ffec164f1f19619b16d6bca5d0614
-
SHA256
c3338e8d8bb652e897c624f3380e1432eb1c4c93091b64dd28abc3cfa02fa804
-
SHA512
b69ff9be50478e7c08216312c2002b46a841f2a233a5a5a895612752b464058d51d11b857fd9c041d0d053dc781a46f2ff3ee7f0c230be2db1bbf3186390bf2a
-
SSDEEP
24576:SxlH0Rs/WSwTwT2gzlthO/GNuD6FOPSKfBbWyq0:OlH0Rs/cQ2AthO/GNuD6FOPSKJbW
Static task
static1
Behavioral task
behavioral1
Sample
c3338e8d8bb652e897c624f3380e1432eb1c4c93091b64dd28abc3cfa02fa804.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c3338e8d8bb652e897c624f3380e1432eb1c4c93091b64dd28abc3cfa02fa804.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://rocheholding.top/evie3/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
c3338e8d8bb652e897c624f3380e1432eb1c4c93091b64dd28abc3cfa02fa804.exe
-
Size
990KB
-
MD5
ccfc8289ea1ad3acab95de0c1e65eb2c
-
SHA1
b38ece908f2ffec164f1f19619b16d6bca5d0614
-
SHA256
c3338e8d8bb652e897c624f3380e1432eb1c4c93091b64dd28abc3cfa02fa804
-
SHA512
b69ff9be50478e7c08216312c2002b46a841f2a233a5a5a895612752b464058d51d11b857fd9c041d0d053dc781a46f2ff3ee7f0c230be2db1bbf3186390bf2a
-
SSDEEP
24576:SxlH0Rs/WSwTwT2gzlthO/GNuD6FOPSKfBbWyq0:OlH0Rs/cQ2AthO/GNuD6FOPSKJbW
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-