General
-
Target
3d30de5fd4e266cba3c7ea595863f7389610d0adc5b62fad362d2eb105d8d4d2
-
Size
547KB
-
Sample
240602-ztbpwsfh85
-
MD5
570b9a59b63ca34257fa7711c5ffb311
-
SHA1
9c7c435dd7514f733d948c2363bc5215b4e908a3
-
SHA256
3d30de5fd4e266cba3c7ea595863f7389610d0adc5b62fad362d2eb105d8d4d2
-
SHA512
6961bece03deb2786d737f3007b460998f013ab4a2931f2d7f75f4f2e3695b050f640c6588d9342517d8c55b620315711b3ca70485bb2e266ed2953561c6d375
-
SSDEEP
12288:n/BPJwKcIrPLQBm0waUv2ZtyH1KgLrPHxsY4ZtXE2KkR:/BhcgQBm0wetioOGbtXE2J
Static task
static1
Behavioral task
behavioral1
Sample
3d30de5fd4e266cba3c7ea595863f7389610d0adc5b62fad362d2eb105d8d4d2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3d30de5fd4e266cba3c7ea595863f7389610d0adc5b62fad362d2eb105d8d4d2.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
lokibot
http://45.61.137.215/index.php/6790
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
3d30de5fd4e266cba3c7ea595863f7389610d0adc5b62fad362d2eb105d8d4d2
-
Size
547KB
-
MD5
570b9a59b63ca34257fa7711c5ffb311
-
SHA1
9c7c435dd7514f733d948c2363bc5215b4e908a3
-
SHA256
3d30de5fd4e266cba3c7ea595863f7389610d0adc5b62fad362d2eb105d8d4d2
-
SHA512
6961bece03deb2786d737f3007b460998f013ab4a2931f2d7f75f4f2e3695b050f640c6588d9342517d8c55b620315711b3ca70485bb2e266ed2953561c6d375
-
SSDEEP
12288:n/BPJwKcIrPLQBm0waUv2ZtyH1KgLrPHxsY4ZtXE2KkR:/BhcgQBm0wetioOGbtXE2J
Score10/10-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing common artifacts observed in infostealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-