General
-
Target
a9faa8d35189935d7d185f68fe04d637a0a8c58e7f6875af096cf86da3306e5d.rar
-
Size
489KB
-
Sample
240528-rm5qdshh54
-
MD5
ce4efe9a6aa7f79fa19f3c16b106372e
-
SHA1
7c76f2964ae7dcb6a6042d0f01b8e8ed73abeb03
-
SHA256
a9faa8d35189935d7d185f68fe04d637a0a8c58e7f6875af096cf86da3306e5d
-
SHA512
7752141d985484943c027163405be388bade07f7f1b4ea48549ac42688bb4c8862c5d9f2ffeaacdf2ee3dc8345ed2f8870db581c2de9cc01b680c5ae92573919
-
SSDEEP
12288:xoqhqvmkFSYmHFpEYFpYkJ/sbsKsPtvLuZ6:UOkFSYmlpE6pY4/s1MtvLt
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Inquiry_#466789.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Purchase Inquiry_#466789.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://45.61.137.215/index.php/t?id=090
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Purchase Inquiry_#466789.exe
-
Size
522KB
-
MD5
5eece0f9333721c96803f39becae9fa3
-
SHA1
4508905c92a34c55d3b9b9fa5700c6b640b9a200
-
SHA256
706a564a593479d9948fe8cfe542c4a788a80e3d08c38dc888179c5340023a08
-
SHA512
09922db0f9814db2398c2f468a56168e36d2b272aafd401dfc607ab78d3599552843cafab443bc6d64997d64fe51774b50adfe952a1938e70390df2d71602144
-
SSDEEP
12288:EOoSQi8LkpEauXFg5bb4P2mvtjB7NAtAHyDBWjUNoxsdlh62b7e7kR:7LvjE9XFxP2mVN7quHydWjUeWLOe
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-