General
-
Target
SWU5109523I.exe
-
Size
1.8MB
-
Sample
240625-l43dpstara
-
MD5
1af02455b4d35d282469dde4144cbd07
-
SHA1
bcd8d182b9d8036ce3b31c4fac14cb1d074e45ff
-
SHA256
2407da1627f35dafc162c06c93c95d612ac0349488241d297152e41d0f8af7a0
-
SHA512
9ab046b3c20985290f155e07441ea97ac84bc064b8f237b2883cb65280bcf9f0b174924e8e20eb22be5b10693b20be02bdaa3ab4f9e9e79c71ded6f031af8c0a
-
SSDEEP
49152:mOD+bTI6YTDml4HJPHDQkOBU0f9iygcrxZ3aU5ZdIrRo2ht1K1YvkUw:rv85
Static task
static1
Behavioral task
behavioral1
Sample
SWU5109523I.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SWU5109523I.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
lokibot
http://sssteell-com.pro/kedu/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
SWU5109523I.exe
-
Size
1.8MB
-
MD5
1af02455b4d35d282469dde4144cbd07
-
SHA1
bcd8d182b9d8036ce3b31c4fac14cb1d074e45ff
-
SHA256
2407da1627f35dafc162c06c93c95d612ac0349488241d297152e41d0f8af7a0
-
SHA512
9ab046b3c20985290f155e07441ea97ac84bc064b8f237b2883cb65280bcf9f0b174924e8e20eb22be5b10693b20be02bdaa3ab4f9e9e79c71ded6f031af8c0a
-
SSDEEP
49152:mOD+bTI6YTDml4HJPHDQkOBU0f9iygcrxZ3aU5ZdIrRo2ht1K1YvkUw:rv85
Score10/10-
Adds policy Run key to start application
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-