General
-
Target
eec24916fc0a978ae5cb878efea2c7cd5c0403783e4e7c438a739b6fa8e30703
-
Size
367KB
-
Sample
240806-yskqqsyfqq
-
MD5
3edc8e31efe97c259c8f2eebbbb4da98
-
SHA1
1692639db61f72b4e1bfa80e4a55bc1cfa8bb129
-
SHA256
eec24916fc0a978ae5cb878efea2c7cd5c0403783e4e7c438a739b6fa8e30703
-
SHA512
65f40b27c53379426e398d6e8ec7e2e64ea836bf4a9871f2aca7c66ef2baba0eb6a512611e935d5a2a3585b56c806d2b0a2ac9dc73cf3f71afa68a34596bae35
-
SSDEEP
6144:lykHWlFEnk3OQdZXq5Brr5JhV/Vz27y1svOwEi4ZABsQCDVlPMimKv6BPBIi+7PM:lpybZXGnbhSGsvOri4ZZdnMim3NB5iw9
Static task
static1
Behavioral task
behavioral1
Sample
eec24916fc0a978ae5cb878efea2c7cd5c0403783e4e7c438a739b6fa8e30703.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
eec24916fc0a978ae5cb878efea2c7cd5c0403783e4e7c438a739b6fa8e30703.exe
Resource
win11-20240802-en
Malware Config
Extracted
lokibot
http://94.156.66.169:5788/bhvstgd/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
eec24916fc0a978ae5cb878efea2c7cd5c0403783e4e7c438a739b6fa8e30703
-
Size
367KB
-
MD5
3edc8e31efe97c259c8f2eebbbb4da98
-
SHA1
1692639db61f72b4e1bfa80e4a55bc1cfa8bb129
-
SHA256
eec24916fc0a978ae5cb878efea2c7cd5c0403783e4e7c438a739b6fa8e30703
-
SHA512
65f40b27c53379426e398d6e8ec7e2e64ea836bf4a9871f2aca7c66ef2baba0eb6a512611e935d5a2a3585b56c806d2b0a2ac9dc73cf3f71afa68a34596bae35
-
SSDEEP
6144:lykHWlFEnk3OQdZXq5Brr5JhV/Vz27y1svOwEi4ZABsQCDVlPMimKv6BPBIi+7PM:lpybZXGnbhSGsvOri4ZZdnMim3NB5iw9
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-