General
-
Target
48d5aff65f2a15098a2c5f6496547eee82cdbd77e1929f5d78652915b374e8f9
-
Size
307KB
-
Sample
240830-zr243avgjb
-
MD5
b909f24029c9192ffbde63593f24398d
-
SHA1
fc14f2caccbb119f3ef94d48a658cde273c46b83
-
SHA256
48d5aff65f2a15098a2c5f6496547eee82cdbd77e1929f5d78652915b374e8f9
-
SHA512
66d5e7b5cf714db2cf70abca09276e26bcc4b65e8b95f7c7c7163d71da0aabaee6cee5f13bde573f5d0fce09c827e202437c3628e02d9a58bdedd469adff9672
-
SSDEEP
6144:jffZD31L7nweBs3DeRdnHJFBlARKe5KmOxlbLTH6C5lu6Q9J9HANzTm1:jffV1L7weBAezHJF3AKmOxx+CPQ9HHA2
Static task
static1
Behavioral task
behavioral1
Sample
08534277cbfb86840d5250f0a0672ac1fa61a3173cdbccaa2f14e0b9707527aa.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
08534277cbfb86840d5250f0a0672ac1fa61a3173cdbccaa2f14e0b9707527aa.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://bobbyelectronics.xyz/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
08534277cbfb86840d5250f0a0672ac1fa61a3173cdbccaa2f14e0b9707527aa
-
Size
369KB
-
MD5
03c4801d0dc21f4d6f0ba7df857844f9
-
SHA1
1f45ccc862fd96d7f205f0ce8860535768e20a70
-
SHA256
08534277cbfb86840d5250f0a0672ac1fa61a3173cdbccaa2f14e0b9707527aa
-
SHA512
fd5016c0b1a5cd0c58a0a6fa060aaed4808499280075ade2dc8de4c53ecd3c2aeb92bc51a58b7679bd33e0ef8c9eef72b86f0551644fad579b02062806b7ff9c
-
SSDEEP
6144:Q6Uqd2GhNNK9bCUB3/bKltyu5/uHFL17unUoJBltTXL:xUi2iNE9bCUBvbOtyu5/uTPoJZ
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-