General
-
Target
5f9d26f02be7d03a6f8acaccc498eca1c0b66f56c3dbf6634aaa9a52dc387da9
-
Size
104KB
-
Sample
240525-1643msda23
-
MD5
5003a3a2bea2de1b60c021ecde3601da
-
SHA1
95bd62acbb1f484d1c5d9b805688247b11b0b01c
-
SHA256
5f9d26f02be7d03a6f8acaccc498eca1c0b66f56c3dbf6634aaa9a52dc387da9
-
SHA512
cd93653a06f6adb2b34650ee6f220304b6e62847ff78bd6140e9e1641d0888d2dd7e1eefe9d76750e77922348f3a5aa7aab8ce96bc40d59376e864747db9cced
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqQIzmd:nSHIG6mQwGmfOQd8YhY0/E1UG
Behavioral task
behavioral1
Sample
5f9d26f02be7d03a6f8acaccc498eca1c0b66f56c3dbf6634aaa9a52dc387da9.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5f9d26f02be7d03a6f8acaccc498eca1c0b66f56c3dbf6634aaa9a52dc387da9.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
lokibot
http://shopper.bulutlogistic.com/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
5f9d26f02be7d03a6f8acaccc498eca1c0b66f56c3dbf6634aaa9a52dc387da9
-
Size
104KB
-
MD5
5003a3a2bea2de1b60c021ecde3601da
-
SHA1
95bd62acbb1f484d1c5d9b805688247b11b0b01c
-
SHA256
5f9d26f02be7d03a6f8acaccc498eca1c0b66f56c3dbf6634aaa9a52dc387da9
-
SHA512
cd93653a06f6adb2b34650ee6f220304b6e62847ff78bd6140e9e1641d0888d2dd7e1eefe9d76750e77922348f3a5aa7aab8ce96bc40d59376e864747db9cced
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqQIzmd:nSHIG6mQwGmfOQd8YhY0/E1UG
Score10/10-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing common artifacts observed in infostealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Accesses Microsoft Outlook profiles
-