General
-
Target
a1f98dff75337ebd5e81d336f425caac569b6d4452a93698c4af3af9e5bddf6b
-
Size
590KB
-
Sample
240707-y5g6dazdra
-
MD5
642cdac6ce35381998ddae29ad0fbe03
-
SHA1
a1cbafd24c126ca211217a89ab766ea404db0207
-
SHA256
a1f98dff75337ebd5e81d336f425caac569b6d4452a93698c4af3af9e5bddf6b
-
SHA512
2910fad839cc8dfa1307bff41a2c213bd233c4d607d1206245a25fde792f960b588f139d714986b9d9f4bda5d8d74917907658e86fe7df82fd289352a6353a22
-
SSDEEP
12288:rM3Gy5luj4VWCs5zNiA4L6acLvI+zv9FH9n5d1o+:evuj4VWl5zwA+2QGvndy
Static task
static1
Behavioral task
behavioral1
Sample
a1f98dff75337ebd5e81d336f425caac569b6d4452a93698c4af3af9e5bddf6b.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a1f98dff75337ebd5e81d336f425caac569b6d4452a93698c4af3af9e5bddf6b.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
lokibot
http://dashboardproducts.info/bally/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
a1f98dff75337ebd5e81d336f425caac569b6d4452a93698c4af3af9e5bddf6b
-
Size
590KB
-
MD5
642cdac6ce35381998ddae29ad0fbe03
-
SHA1
a1cbafd24c126ca211217a89ab766ea404db0207
-
SHA256
a1f98dff75337ebd5e81d336f425caac569b6d4452a93698c4af3af9e5bddf6b
-
SHA512
2910fad839cc8dfa1307bff41a2c213bd233c4d607d1206245a25fde792f960b588f139d714986b9d9f4bda5d8d74917907658e86fe7df82fd289352a6353a22
-
SSDEEP
12288:rM3Gy5luj4VWCs5zNiA4L6acLvI+zv9FH9n5d1o+:evuj4VWl5zwA+2QGvndy
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-