General
-
Target
SWU5109523I.7z.zip
-
Size
888KB
-
Sample
240625-qtjk3awbjq
-
MD5
36284d227825c61d94b0b0ae6984d94c
-
SHA1
b74f9df6926ec26227026a0e346edf7bee2d23a7
-
SHA256
6628f1123f4f18db8b6e612037714c9b0e314a495df027b2ba99aa9dfe87a71e
-
SHA512
c66d53d9fabb69b6caaea9db3c33602e4794b76101e49aeb7db8d28cf4405b8a38b711ca35f935b5c1c0fb2fca13da50fb938e6bbf232c1d5dbdea355037f725
-
SSDEEP
24576:q2tWnF9Afgt3r39IMH0Dg9LRM5u8lVdNfRwxLw:1gJbCe00Lqnd3wxLw
Static task
static1
Behavioral task
behavioral1
Sample
SWU5109523I.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
SWU5109523I.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://sssteell-com.pro/kedu/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
SWU5109523I.exe
-
Size
1.8MB
-
MD5
1af02455b4d35d282469dde4144cbd07
-
SHA1
bcd8d182b9d8036ce3b31c4fac14cb1d074e45ff
-
SHA256
2407da1627f35dafc162c06c93c95d612ac0349488241d297152e41d0f8af7a0
-
SHA512
9ab046b3c20985290f155e07441ea97ac84bc064b8f237b2883cb65280bcf9f0b174924e8e20eb22be5b10693b20be02bdaa3ab4f9e9e79c71ded6f031af8c0a
-
SSDEEP
49152:mOD+bTI6YTDml4HJPHDQkOBU0f9iygcrxZ3aU5ZdIrRo2ht1K1YvkUw:rv85
Score10/10-
Adds policy Run key to start application
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-