General
-
Target
38ab1533c224b90043299dc9b2a42bf456d0521de6d89a8eeb44336771943c3f.exe
-
Size
995KB
-
Sample
240730-s36s3a1dnf
-
MD5
cfe05392605f333a1ed9abc7fe992635
-
SHA1
60e56713191a5ff83cc905debd5a76c80fcd77de
-
SHA256
38ab1533c224b90043299dc9b2a42bf456d0521de6d89a8eeb44336771943c3f
-
SHA512
7b0e1ba85bbea3ed3e8dc46f265c8b517bec6639e1777e2ebde4e6b336cb547a45c3e01b093d73714df253f45aab7d1635ac213a2bd1f14f70f37fa94e1de96e
-
SSDEEP
12288:rmeFmKg5mPN3ohe4/35ww17fsur4o23ZY19Uc:uJhXyaUy4og4Kc
Static task
static1
Behavioral task
behavioral1
Sample
38ab1533c224b90043299dc9b2a42bf456d0521de6d89a8eeb44336771943c3f.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
38ab1533c224b90043299dc9b2a42bf456d0521de6d89a8eeb44336771943c3f.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
lokibot
http://serak.top/ugopounds/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
38ab1533c224b90043299dc9b2a42bf456d0521de6d89a8eeb44336771943c3f.exe
-
Size
995KB
-
MD5
cfe05392605f333a1ed9abc7fe992635
-
SHA1
60e56713191a5ff83cc905debd5a76c80fcd77de
-
SHA256
38ab1533c224b90043299dc9b2a42bf456d0521de6d89a8eeb44336771943c3f
-
SHA512
7b0e1ba85bbea3ed3e8dc46f265c8b517bec6639e1777e2ebde4e6b336cb547a45c3e01b093d73714df253f45aab7d1635ac213a2bd1f14f70f37fa94e1de96e
-
SSDEEP
12288:rmeFmKg5mPN3ohe4/35ww17fsur4o23ZY19Uc:uJhXyaUy4og4Kc
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-