General
-
Target
3ef6748718e356e17a6edc5b7e60784c6ca011748421b0163ef3ab43741260f8.exe
-
Size
503KB
-
Sample
240619-bmpq6s1cjg
-
MD5
51f1fee73b718b767fce1ef9c33b1faa
-
SHA1
25631c3c8a52166dfa46db1d57f4acca4a38546f
-
SHA256
3ef6748718e356e17a6edc5b7e60784c6ca011748421b0163ef3ab43741260f8
-
SHA512
1e4c45e7aa2951c0d4258b909ca062ed16148b4fce5a14bf5277fd1c5781ccbfceec333efdc236ba5cc9ec12082913199b524b2df67292b1abe3478bbafe8b8d
-
SSDEEP
6144:fij2hYUvFIsP3Qm5cedrtLioM33dGON9ANms1XqZMr+hkEZVOdT+B0FlDwuJk6UD:rFIsPAedrR9acg9mq2CvAdK/lIb
Static task
static1
Behavioral task
behavioral1
Sample
3ef6748718e356e17a6edc5b7e60784c6ca011748421b0163ef3ab43741260f8.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
3ef6748718e356e17a6edc5b7e60784c6ca011748421b0163ef3ab43741260f8.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
lokibot
http://104.248.205.66/index.php/935156794695
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
3ef6748718e356e17a6edc5b7e60784c6ca011748421b0163ef3ab43741260f8.exe
-
Size
503KB
-
MD5
51f1fee73b718b767fce1ef9c33b1faa
-
SHA1
25631c3c8a52166dfa46db1d57f4acca4a38546f
-
SHA256
3ef6748718e356e17a6edc5b7e60784c6ca011748421b0163ef3ab43741260f8
-
SHA512
1e4c45e7aa2951c0d4258b909ca062ed16148b4fce5a14bf5277fd1c5781ccbfceec333efdc236ba5cc9ec12082913199b524b2df67292b1abe3478bbafe8b8d
-
SSDEEP
6144:fij2hYUvFIsP3Qm5cedrtLioM33dGON9ANms1XqZMr+hkEZVOdT+B0FlDwuJk6UD:rFIsPAedrR9acg9mq2CvAdK/lIb
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-