General
-
Target
fb94701002816ee47f78f3712fef111cb1e16aba754f1df4a9796746b836a39e.exe
-
Size
754KB
-
Sample
240528-b4f6csab4x
-
MD5
8ed6f5c578a44b191a187624c4664d7b
-
SHA1
834a8dd27f54f9c35045e34d8c0ac604516a3e12
-
SHA256
fb94701002816ee47f78f3712fef111cb1e16aba754f1df4a9796746b836a39e
-
SHA512
fa5e083b4480e329bf61cfa8e5faf1e4eed2d71c35c2422a3a5e267120b6087142d3cc569517957e7352d15f47a9977bf16e410e83fe78e166f1d441e028fd99
-
SSDEEP
12288:b8+Ep9UQ8JibdmHrwOPLDbK8+FpeIdJqkR:b85p9UfIbULDbEeIdH
Static task
static1
Behavioral task
behavioral1
Sample
fb94701002816ee47f78f3712fef111cb1e16aba754f1df4a9796746b836a39e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb94701002816ee47f78f3712fef111cb1e16aba754f1df4a9796746b836a39e.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
lokibot
http://45.61.137.215/index.php/t?id=090
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
fb94701002816ee47f78f3712fef111cb1e16aba754f1df4a9796746b836a39e.exe
-
Size
754KB
-
MD5
8ed6f5c578a44b191a187624c4664d7b
-
SHA1
834a8dd27f54f9c35045e34d8c0ac604516a3e12
-
SHA256
fb94701002816ee47f78f3712fef111cb1e16aba754f1df4a9796746b836a39e
-
SHA512
fa5e083b4480e329bf61cfa8e5faf1e4eed2d71c35c2422a3a5e267120b6087142d3cc569517957e7352d15f47a9977bf16e410e83fe78e166f1d441e028fd99
-
SSDEEP
12288:b8+Ep9UQ8JibdmHrwOPLDbK8+FpeIdJqkR:b85p9UfIbULDbEeIdH
Score10/10-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing common artifacts observed in infostealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-