General
-
Target
49d924a596afdf11b8bd1bad247842516caf27fc8f208c32019d11338a5a828e.exe
-
Size
104KB
-
Sample
240522-bwlqwagc2w
-
MD5
a9c1d17efc074a683fca5ef797a90d5f
-
SHA1
55c14ffbb4a73dfec33419e8d5d88a36c64a2cb8
-
SHA256
49d924a596afdf11b8bd1bad247842516caf27fc8f208c32019d11338a5a828e
-
SHA512
6fd07dc1ac459cd8708bf86277885ca46ac3cb6c7ffe058cebf40b8083e134e2b08222dd36b6c73fd37e3affad5c198b32618cbcab9436f81d797d7197cdb83f
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG
Behavioral task
behavioral1
Sample
49d924a596afdf11b8bd1bad247842516caf27fc8f208c32019d11338a5a828e.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
49d924a596afdf11b8bd1bad247842516caf27fc8f208c32019d11338a5a828e.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://45.61.137.215/index.php/index?id=671120760852658
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
49d924a596afdf11b8bd1bad247842516caf27fc8f208c32019d11338a5a828e.exe
-
Size
104KB
-
MD5
a9c1d17efc074a683fca5ef797a90d5f
-
SHA1
55c14ffbb4a73dfec33419e8d5d88a36c64a2cb8
-
SHA256
49d924a596afdf11b8bd1bad247842516caf27fc8f208c32019d11338a5a828e
-
SHA512
6fd07dc1ac459cd8708bf86277885ca46ac3cb6c7ffe058cebf40b8083e134e2b08222dd36b6c73fd37e3affad5c198b32618cbcab9436f81d797d7197cdb83f
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG
Score10/10-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing common artifacts observed in infostealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Accesses Microsoft Outlook profiles
-