General
-
Target
060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe
-
Size
762KB
-
Sample
240607-bdjhsseg9v
-
MD5
0f49bb0c2a604fa78ec0bd36b0a7f364
-
SHA1
5753b5b6e57c521670d901f441f8e2c65292542e
-
SHA256
060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83
-
SHA512
0e4e689afdd64e160293ad7d3e26871e20bb53b65e5c3276ba52b325ea9e616019bfda1e0c9fa6342beeb4fe6896ff4b44be4ca8a2c26acc7ca7b0bb2fc95180
-
SSDEEP
12288:M3qyJMrv295xzbgiPZ1xRllixBcyFDBdH7X+yz3dP7r9r/+ppppppppppppppppF:M6OmvzAUDBt7XvLd1q
Static task
static1
Behavioral task
behavioral1
Sample
060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://164.90.149.46/index.php/check.php?s=1
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe
-
Size
762KB
-
MD5
0f49bb0c2a604fa78ec0bd36b0a7f364
-
SHA1
5753b5b6e57c521670d901f441f8e2c65292542e
-
SHA256
060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83
-
SHA512
0e4e689afdd64e160293ad7d3e26871e20bb53b65e5c3276ba52b325ea9e616019bfda1e0c9fa6342beeb4fe6896ff4b44be4ca8a2c26acc7ca7b0bb2fc95180
-
SSDEEP
12288:M3qyJMrv295xzbgiPZ1xRllixBcyFDBdH7X+yz3dP7r9r/+ppppppppppppppppF:M6OmvzAUDBt7XvLd1q
Score10/10-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing common artifacts observed in infostealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-