General
-
Target
00ac69740d27d7d7304331fe6523983ac267a94a17d670bd9ef5b8b745148974.exe
-
Size
1.1MB
-
Sample
240726-bhs8sswgql
-
MD5
da2dd76b31a45ea2b9f54e9a7ff22f79
-
SHA1
d674ed49f4be14b16abe7b71b96927288740309e
-
SHA256
00ac69740d27d7d7304331fe6523983ac267a94a17d670bd9ef5b8b745148974
-
SHA512
c5f25453068d7bff4af855873b59b95db69dc456d9a38c5cddba07eb95c9a2a58d98bb391d823cc9b41c8aaae15234a2baac642202c44a96c41c7683ede89178
-
SSDEEP
24576:oqDEvCTbMWu7rQYlBQcBiT6rprG8aLF/IcUuJ94fdFc:oTvC/MTQYxsWR7aLFRUuiF
Static task
static1
Behavioral task
behavioral1
Sample
00ac69740d27d7d7304331fe6523983ac267a94a17d670bd9ef5b8b745148974.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
00ac69740d27d7d7304331fe6523983ac267a94a17d670bd9ef5b8b745148974.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
lokibot
http://sempersim.su/c3/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
00ac69740d27d7d7304331fe6523983ac267a94a17d670bd9ef5b8b745148974.exe
-
Size
1.1MB
-
MD5
da2dd76b31a45ea2b9f54e9a7ff22f79
-
SHA1
d674ed49f4be14b16abe7b71b96927288740309e
-
SHA256
00ac69740d27d7d7304331fe6523983ac267a94a17d670bd9ef5b8b745148974
-
SHA512
c5f25453068d7bff4af855873b59b95db69dc456d9a38c5cddba07eb95c9a2a58d98bb391d823cc9b41c8aaae15234a2baac642202c44a96c41c7683ede89178
-
SSDEEP
24576:oqDEvCTbMWu7rQYlBQcBiT6rprG8aLF/IcUuJ94fdFc:oTvC/MTQYxsWR7aLFRUuiF
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-