General
-
Target
fe566ca240ef3e71e3e89148972262960bdf11281cba8354f262d834cb9b59f4.exe
-
Size
719KB
-
Sample
240604-s2barscc86
-
MD5
a8d0067c1cb89b67dacc3b904324a0e3
-
SHA1
aed3b5e9b8d30880ea9c0e53247f83d17920702b
-
SHA256
fe566ca240ef3e71e3e89148972262960bdf11281cba8354f262d834cb9b59f4
-
SHA512
4e24a8863d223a837228afbc7a71bf37ac903ad383c97936432a7093b89e8b42a5f5e1b470c03edae83e218f48e3e4cab3c92c15c00dd9fda2612f06715cc863
-
SSDEEP
12288:NMYeaky/Qa0KP1x+kPwu9Jx/mPGt/rFfaWtapLj/potZTO8Sm/njPOfZV46Bp6wI:NMYeleN5iW8p4K8SqPOfjpjxkVbf
Static task
static1
Behavioral task
behavioral1
Sample
fe566ca240ef3e71e3e89148972262960bdf11281cba8354f262d834cb9b59f4.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fe566ca240ef3e71e3e89148972262960bdf11281cba8354f262d834cb9b59f4.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://45.61.137.215/index.php/t?id=090
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
fe566ca240ef3e71e3e89148972262960bdf11281cba8354f262d834cb9b59f4.exe
-
Size
719KB
-
MD5
a8d0067c1cb89b67dacc3b904324a0e3
-
SHA1
aed3b5e9b8d30880ea9c0e53247f83d17920702b
-
SHA256
fe566ca240ef3e71e3e89148972262960bdf11281cba8354f262d834cb9b59f4
-
SHA512
4e24a8863d223a837228afbc7a71bf37ac903ad383c97936432a7093b89e8b42a5f5e1b470c03edae83e218f48e3e4cab3c92c15c00dd9fda2612f06715cc863
-
SSDEEP
12288:NMYeaky/Qa0KP1x+kPwu9Jx/mPGt/rFfaWtapLj/potZTO8Sm/njPOfZV46Bp6wI:NMYeleN5iW8p4K8SqPOfjpjxkVbf
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-