General
-
Target
5953963046133560cdd678479c39cad1.bin
-
Size
500KB
-
Sample
240819-bqv3cswelb
-
MD5
6568cc942ea2b1ea1581c9d2420d7c8a
-
SHA1
1f3c3003fd4c47aca6dc101445e94f7d9d4a426b
-
SHA256
be19e39c3efdb091aaea0bdb4101e2a2574e42f9478ac627cf309c7e011fca11
-
SHA512
4f7b42533479dfb62e478bc7bf3d84d5e362d0014a39071841321c3996357c1d897e8be7802906c8812167bb472416394629a81c7b68d809269457603185f0f4
-
SSDEEP
12288:UFs5WswDKDwF9d7HLRkjVeWk8z6xzVC7gQ35L5O06fBXnwlHEI:Ui4sWKDUWe0s5Cr804nIx
Static task
static1
Behavioral task
behavioral1
Sample
d9e1a2fcf6f37d422bd254c1231f2fc785bea5208aa8e71f8720249d3b369823.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d9e1a2fcf6f37d422bd254c1231f2fc785bea5208aa8e71f8720249d3b369823.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://104.248.205.66/index.php/17008709
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d9e1a2fcf6f37d422bd254c1231f2fc785bea5208aa8e71f8720249d3b369823.exe
-
Size
511KB
-
MD5
5953963046133560cdd678479c39cad1
-
SHA1
0dee9eb9b2f30f6eb00104fd45b06bbb02751c0e
-
SHA256
d9e1a2fcf6f37d422bd254c1231f2fc785bea5208aa8e71f8720249d3b369823
-
SHA512
c89eb65693cd144b89afd8f3a69a06396aaf15c9846ae773c2d8e555257653d8fa7743e659ca69c17b02f0b5ea915ae6372da00ff8479a91993f2b392f986483
-
SSDEEP
12288:ZGNBzT3qqKHAw/dAAmy3F2DQtLfjRFgro0pPaRtCWg:UfzT3bKgw/dAAmmFcQ1fjsDWg
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-