General
-
Target
9b1a701176e76825bc886d067194fc7aa514c5cbffb63c039d62154c5b9d3ac7.exe
-
Size
573KB
-
Sample
240601-wv39rabd52
-
MD5
69767efcfefe680cf0332030e9bf1630
-
SHA1
99e23c596a2c5b8b4f1b8b969d0f966e21082f5d
-
SHA256
9b1a701176e76825bc886d067194fc7aa514c5cbffb63c039d62154c5b9d3ac7
-
SHA512
1bccb3f8ccacb6e29c3191d828895db7994023522832e13e859eedfa79df27361f24577c588424bd44f90214dbe22163cf88f735c203bc250e44b72e5a7a7fa9
-
SSDEEP
12288:ePOVEwgF05/FwmXAtcp7ejh/rJd98WR0cIKuWhQWsmgvezkR:buPq/CXcp7mh/rJdCW7uWeLme
Static task
static1
Behavioral task
behavioral1
Sample
9b1a701176e76825bc886d067194fc7aa514c5cbffb63c039d62154c5b9d3ac7.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9b1a701176e76825bc886d067194fc7aa514c5cbffb63c039d62154c5b9d3ac7.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://45.61.137.215/index.php/t?id=090
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
9b1a701176e76825bc886d067194fc7aa514c5cbffb63c039d62154c5b9d3ac7.exe
-
Size
573KB
-
MD5
69767efcfefe680cf0332030e9bf1630
-
SHA1
99e23c596a2c5b8b4f1b8b969d0f966e21082f5d
-
SHA256
9b1a701176e76825bc886d067194fc7aa514c5cbffb63c039d62154c5b9d3ac7
-
SHA512
1bccb3f8ccacb6e29c3191d828895db7994023522832e13e859eedfa79df27361f24577c588424bd44f90214dbe22163cf88f735c203bc250e44b72e5a7a7fa9
-
SSDEEP
12288:ePOVEwgF05/FwmXAtcp7ejh/rJd98WR0cIKuWhQWsmgvezkR:buPq/CXcp7mh/rJdCW7uWeLme
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-