General
-
Target
6921540728f84fd30767501f0097c29242f33878a5953a583c0a59f0056494c3.rar
-
Size
481KB
-
Sample
240530-bmxrsahb5x
-
MD5
0e62c6a37a663e40f6e50f372d1dbc42
-
SHA1
98e67f14486ba43ad82cc2e3dcfcab21c539f0f3
-
SHA256
6921540728f84fd30767501f0097c29242f33878a5953a583c0a59f0056494c3
-
SHA512
5bc10dd7548f9df7f568c97660a238975ba8ef2565ca7ffa50ffac3d583733df1d8220caa6b644d8903739dad965e6e40c1a7ab9c2e2f9653a6426e8b3cc6780
-
SSDEEP
12288:Q40pfb0RZ3NiDYRTHeUBptiVixCP1SLRhcIF0nkyO3SGuNnHTcU:qfb0RZ3wDYRTeUBP/e4ouRSFoU
Static task
static1
Behavioral task
behavioral1
Sample
PO#34316_20240528.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
PO#34316_20240528.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://45.61.137.215/index.php/t?id=090
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
PO#34316_20240528.exe
-
Size
535KB
-
MD5
14510710e98b064e69ecb55e956b2efe
-
SHA1
8e4a25f4b78a9293e39bcfb67686e0e0a4e5873a
-
SHA256
6dbe9a6e92e3962725c30e1533f195da33329b089a537557b1c3571225969191
-
SHA512
76b3116a1deae0c18add797a8c078fa621303292abaeefcef3eb67e01ae2ea21945a272936a356e17bd4ac17b809b05fd6c90da6b67126bcf3827b5496789363
-
SSDEEP
12288:+KcAV/xf4MbNpcFC1f41Vk6EjRlHs4vBqzkR:HOC1okFjHs453
Score10/10-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing common artifacts observed in infostealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-