General
-
Target
2740-14-0x0000000000290000-0x0000000000332000-memory.dmp
-
Size
648KB
-
Sample
240806-fnqr3sthpa
-
MD5
9c4a9c0ca85cae199e6342491bdddd31
-
SHA1
5996b54c6c3662f100dc5b4ed8b4e014daaa2746
-
SHA256
d6c8d5b7944bc816aadd9aa11a3326256574d9c7c326d90b223051382c32d83f
-
SHA512
4e4b2814b41ad31e960132b5da41a1d7bcfc16bea99158e0ee9ae3afe35de73c62632ed52bd9fc8c8e54f0291c3a373a56e11140c32df1937bd8ed6c565a83c4
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG
Behavioral task
behavioral1
Sample
2740-14-0x0000000000290000-0x0000000000332000-memory.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2740-14-0x0000000000290000-0x0000000000332000-memory.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://sempersim.su/d2/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
2740-14-0x0000000000290000-0x0000000000332000-memory.dmp
-
Size
648KB
-
MD5
9c4a9c0ca85cae199e6342491bdddd31
-
SHA1
5996b54c6c3662f100dc5b4ed8b4e014daaa2746
-
SHA256
d6c8d5b7944bc816aadd9aa11a3326256574d9c7c326d90b223051382c32d83f
-
SHA512
4e4b2814b41ad31e960132b5da41a1d7bcfc16bea99158e0ee9ae3afe35de73c62632ed52bd9fc8c8e54f0291c3a373a56e11140c32df1937bd8ed6c565a83c4
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-