General
-
Target
Staff Record_PDF.arj
-
Size
539KB
-
Sample
240617-kxdlbsxenk
-
MD5
fc18d2367866158703f80be4b0bd06a0
-
SHA1
5c929bd4c7007cbb25e91ec71a9c36544a10d0db
-
SHA256
278b402f4cebc3c360e2e9b1f0e47d8db27c6d540b0a49a32e73d22645efb093
-
SHA512
4eb9379975515f835764295e9ca1a7ebfcaeb6e2b169c5f151d895520fd76b67972aec63c32b87a105dbeb551a3ef911956af5fa49411a65093353445fbecc7a
-
SSDEEP
12288:ZZT4Ag5BXcj6jXEjwVj9KNzIwKWmn1gi070v5uZpUZ:Zp4Ag5BXcj6ojZNrmnBTZ
Static task
static1
Behavioral task
behavioral1
Sample
Staff Record_PDF.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
https://edgewell.cam/DV2/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Staff Record_PDF.exe
-
Size
968KB
-
MD5
4f1838cfbdcb694056615a0a8d72943e
-
SHA1
a676b83c1f8d45de959072f2dca2adbffd03478d
-
SHA256
a25fcb635932b386b8816b2f4b2d36e2dbd067f2108b40edc5db80fb303e270e
-
SHA512
ecc641e9a25eb0dfa237dcfbbc3a1ade5df77953f5931d06b838239cf2a3284d800792bd52eefc5b1a4a0f01bc1dc3d2b4f29fbcb8f1a2fc495e027206822258
-
SSDEEP
24576:Atb20pkaCqT5TBWgNQ7aadnrKXcDxl6A:JVg5tQ7aadnrMcD/5
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-