General
-
Target
cf0a7ebf8a713dff2b85087c26263d30N.exe
-
Size
1.4MB
-
Sample
240806-t3gdvaxgma
-
MD5
cf0a7ebf8a713dff2b85087c26263d30
-
SHA1
4637d2ace76a1b41c05165857088dde19360513f
-
SHA256
847a45dd38640c2242f2546be37dd875f0f7a1b1cdc46cb93da77c1f3de4da05
-
SHA512
6be4803fac2b2ef11a196f129e626fa72de8962e119c1c53f666cadaefec6984366e4d6eb7420edda93fc78186a1a1e1a214edcffbb64ac84d52ae762ba8fbfa
-
SSDEEP
24576:TuiFz0aTrLFji/pgvwSoWCJKIDTf1UKiQEaP:hFz0SFjR7RCJtDT9dbEaP
Static task
static1
Behavioral task
behavioral1
Sample
cf0a7ebf8a713dff2b85087c26263d30N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cf0a7ebf8a713dff2b85087c26263d30N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://xyz-storez.xyz/secure/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
cf0a7ebf8a713dff2b85087c26263d30N.exe
-
Size
1.4MB
-
MD5
cf0a7ebf8a713dff2b85087c26263d30
-
SHA1
4637d2ace76a1b41c05165857088dde19360513f
-
SHA256
847a45dd38640c2242f2546be37dd875f0f7a1b1cdc46cb93da77c1f3de4da05
-
SHA512
6be4803fac2b2ef11a196f129e626fa72de8962e119c1c53f666cadaefec6984366e4d6eb7420edda93fc78186a1a1e1a214edcffbb64ac84d52ae762ba8fbfa
-
SSDEEP
24576:TuiFz0aTrLFji/pgvwSoWCJKIDTf1UKiQEaP:hFz0SFjR7RCJtDT9dbEaP
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-