General
-
Target
eb6d3ace662019bd56815df63efce445a2f9357ca21a187517e11d8a7dd022d7
-
Size
1.1MB
-
Sample
240521-f9l11scg79
-
MD5
8b55653ee4d81ebca0bdc88e3b5fc942
-
SHA1
27f988ad6c42417936d25282f960c16daeebc00c
-
SHA256
eb6d3ace662019bd56815df63efce445a2f9357ca21a187517e11d8a7dd022d7
-
SHA512
9bcca862c26fd0b41a0e4203fa6546fbda3c2a551d5115bb1fb204aee3644dc18c80d7eacdaa05815dd73ad5cd834ceddf0ab2f2ec233bdc7deb9f691c910b35
-
SSDEEP
24576:FSu1S82mBVrIiudqfO/9kfbRyWNaRVSVOJFXH7C:FSuU82mTVnRlxN1sJFX
Static task
static1
Behavioral task
behavioral1
Sample
eb6d3ace662019bd56815df63efce445a2f9357ca21a187517e11d8a7dd022d7.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
eb6d3ace662019bd56815df63efce445a2f9357ca21a187517e11d8a7dd022d7.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://sempersim.su/d3/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
eb6d3ace662019bd56815df63efce445a2f9357ca21a187517e11d8a7dd022d7
-
Size
1.1MB
-
MD5
8b55653ee4d81ebca0bdc88e3b5fc942
-
SHA1
27f988ad6c42417936d25282f960c16daeebc00c
-
SHA256
eb6d3ace662019bd56815df63efce445a2f9357ca21a187517e11d8a7dd022d7
-
SHA512
9bcca862c26fd0b41a0e4203fa6546fbda3c2a551d5115bb1fb204aee3644dc18c80d7eacdaa05815dd73ad5cd834ceddf0ab2f2ec233bdc7deb9f691c910b35
-
SSDEEP
24576:FSu1S82mBVrIiudqfO/9kfbRyWNaRVSVOJFXH7C:FSuU82mTVnRlxN1sJFX
Score10/10-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing common artifacts observed in infostealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-