General
-
Target
0895613dd4462d19ca353caea2efdf89d0fb8f1918e73d1ac74ec8a5fbfb827b.exe
-
Size
489KB
-
Sample
240726-qct1gatamb
-
MD5
625e9c7c84a6a483a495626a23875a4b
-
SHA1
73ce99fbd50d348305465ea209f5c87c52fba0b3
-
SHA256
0895613dd4462d19ca353caea2efdf89d0fb8f1918e73d1ac74ec8a5fbfb827b
-
SHA512
f9c5de9976e878cda5e805f66825127fc578cde33f5b1ee2ffe9b9e855528939000f6a1b7aa3de3756ced10b57ac20969c0e5a4b1a7ca8440c77204e741141a0
-
SSDEEP
12288:zbs3/5X6MAch7DxSCJt9K1uBX16U+qK2ui9aZy/:fwBp5VzdbBEpqKpi9aZ
Static task
static1
Behavioral task
behavioral1
Sample
0895613dd4462d19ca353caea2efdf89d0fb8f1918e73d1ac74ec8a5fbfb827b.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0895613dd4462d19ca353caea2efdf89d0fb8f1918e73d1ac74ec8a5fbfb827b.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
lokibot
https://sempersim.su/c18/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
0895613dd4462d19ca353caea2efdf89d0fb8f1918e73d1ac74ec8a5fbfb827b.exe
-
Size
489KB
-
MD5
625e9c7c84a6a483a495626a23875a4b
-
SHA1
73ce99fbd50d348305465ea209f5c87c52fba0b3
-
SHA256
0895613dd4462d19ca353caea2efdf89d0fb8f1918e73d1ac74ec8a5fbfb827b
-
SHA512
f9c5de9976e878cda5e805f66825127fc578cde33f5b1ee2ffe9b9e855528939000f6a1b7aa3de3756ced10b57ac20969c0e5a4b1a7ca8440c77204e741141a0
-
SSDEEP
12288:zbs3/5X6MAch7DxSCJt9K1uBX16U+qK2ui9aZy/:fwBp5VzdbBEpqKpi9aZ
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-