General
-
Target
Purchase Order.exe
-
Size
520KB
-
Sample
240717-rn2ecsxfqb
-
MD5
cdad057bf858cecb47bcf67d3b9fe985
-
SHA1
0e51ac74967a4771cc5b0e0fa16039da7d1ad97b
-
SHA256
05f763c6293bbf6ea3cb055043265326f6d714b30b7032a6fcbe236bf46233d9
-
SHA512
4508956347171da74e06c8b7aa5dd6810d2d2923065a47ebd4790644729db39c4e3ea77ceaf36898515413fd7a10666987706fae293957ecbf8fd87f92117292
-
SSDEEP
12288:KQdRlF6OB7cYznoRyTctRdJyzjDA/N0AJ7y0muakyLb5Z:fRv6OB42oRyTgyzjDA/iARmZkMdZ
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Purchase Order.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
lokibot
http://verose.top/alpha/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Purchase Order.exe
-
Size
520KB
-
MD5
cdad057bf858cecb47bcf67d3b9fe985
-
SHA1
0e51ac74967a4771cc5b0e0fa16039da7d1ad97b
-
SHA256
05f763c6293bbf6ea3cb055043265326f6d714b30b7032a6fcbe236bf46233d9
-
SHA512
4508956347171da74e06c8b7aa5dd6810d2d2923065a47ebd4790644729db39c4e3ea77ceaf36898515413fd7a10666987706fae293957ecbf8fd87f92117292
-
SSDEEP
12288:KQdRlF6OB7cYznoRyTctRdJyzjDA/N0AJ7y0muakyLb5Z:fRv6OB42oRyTgyzjDA/iARmZkMdZ
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-