General
-
Target
1a295933a80907bda689b231e5295eae86bd19b21964ee8669ceb5598c9d714d.exe
-
Size
512KB
-
Sample
240717-v1pg4sthpe
-
MD5
8a43a10dc1358f554584a7e8c5dfdf1a
-
SHA1
421b526ab7b03c4fb1529af55074b4cf1fba30af
-
SHA256
1a295933a80907bda689b231e5295eae86bd19b21964ee8669ceb5598c9d714d
-
SHA512
01bd26a75515bb6cb1e6c36bd23bb97c6dda28f6acebe40078a20d0caa865d48660cd66a1b22d404271f4fe818b90b2ddb8df0e984ad973c055e69972e871e5e
-
SSDEEP
6144:RwgMufVBLKEbbfYeBxZGZ+fGvcaZYE6DMQRWXu9laoMBZXVseAzBL/1nW3r3CvEa:RwfufVLG+fGvqEQqBV2hWuhb
Static task
static1
Behavioral task
behavioral1
Sample
1a295933a80907bda689b231e5295eae86bd19b21964ee8669ceb5598c9d714d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1a295933a80907bda689b231e5295eae86bd19b21964ee8669ceb5598c9d714d.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
lokibot
http://rocheholding.top/rudolph/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
1a295933a80907bda689b231e5295eae86bd19b21964ee8669ceb5598c9d714d.exe
-
Size
512KB
-
MD5
8a43a10dc1358f554584a7e8c5dfdf1a
-
SHA1
421b526ab7b03c4fb1529af55074b4cf1fba30af
-
SHA256
1a295933a80907bda689b231e5295eae86bd19b21964ee8669ceb5598c9d714d
-
SHA512
01bd26a75515bb6cb1e6c36bd23bb97c6dda28f6acebe40078a20d0caa865d48660cd66a1b22d404271f4fe818b90b2ddb8df0e984ad973c055e69972e871e5e
-
SSDEEP
6144:RwgMufVBLKEbbfYeBxZGZ+fGvcaZYE6DMQRWXu9laoMBZXVseAzBL/1nW3r3CvEa:RwfufVLG+fGvqEQqBV2hWuhb
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-