General
-
Target
d9e1a2fcf6f37d422bd254c1231f2fc785bea5208aa8e71f8720249d3b369823_payload.exe
-
Size
104KB
-
Sample
240817-t7ncysycrn
-
MD5
f8ee8e7439e2d2d3b349bef5a1c8d336
-
SHA1
8ed998b87607879fe459673dfc35fab235caf70f
-
SHA256
6914cfc39719a58e5d2757e6413590189f8ccd7e6183f45f794931be7638802d
-
SHA512
4357d8b6734173f1d76369c1f113789a95c1755fc007005d9a135a9b1d7da055d771b48581a0b189b4009c22025b91b61b6116a4176ddb1e46e87d0e5aac5987
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG
Behavioral task
behavioral1
Sample
d9e1a2fcf6f37d422bd254c1231f2fc785bea5208aa8e71f8720249d3b369823_payload.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d9e1a2fcf6f37d422bd254c1231f2fc785bea5208aa8e71f8720249d3b369823_payload.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://104.248.205.66/index.php/17008709
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d9e1a2fcf6f37d422bd254c1231f2fc785bea5208aa8e71f8720249d3b369823_payload.exe
-
Size
104KB
-
MD5
f8ee8e7439e2d2d3b349bef5a1c8d336
-
SHA1
8ed998b87607879fe459673dfc35fab235caf70f
-
SHA256
6914cfc39719a58e5d2757e6413590189f8ccd7e6183f45f794931be7638802d
-
SHA512
4357d8b6734173f1d76369c1f113789a95c1755fc007005d9a135a9b1d7da055d771b48581a0b189b4009c22025b91b61b6116a4176ddb1e46e87d0e5aac5987
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-