General
-
Target
353a06ea99f982edf0784f0fc757707efdd89e78626c77e383f52ef5c9d65b1c
-
Size
269KB
-
Sample
240831-ghapcayekh
-
MD5
3f9324717014832662b03b0fa25f4128
-
SHA1
d5a5440068c4578f3c07957f6b73e2be86c14ad3
-
SHA256
353a06ea99f982edf0784f0fc757707efdd89e78626c77e383f52ef5c9d65b1c
-
SHA512
516a75a3e03cc543c3d2a64adf0a1b38bb477831f94857ee7aa65599af10f5fb94b24f434dbf8450f5c44534a1d8b354143d4f85254ae4a36f5c0054ea9f8fed
-
SSDEEP
6144:xYzDfFOowHUZSLm9Pw/FqlY6z7a/OUPJeHuP32NqjW0y1Ur13M:xQDdOjHrKUwlUJau+ukv
Static task
static1
Behavioral task
behavioral1
Sample
b271f15120e69ae544c096b528961dcb21eb06dab1044973bce2628b2b9e2eaa.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b271f15120e69ae544c096b528961dcb21eb06dab1044973bce2628b2b9e2eaa.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://checkvim.com/ga18/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
b271f15120e69ae544c096b528961dcb21eb06dab1044973bce2628b2b9e2eaa
-
Size
325KB
-
MD5
69782d0f8e22cb23add13a5d7c8cd8cf
-
SHA1
6c055a7dcace0152be0a542cfe81fac54b4c331b
-
SHA256
b271f15120e69ae544c096b528961dcb21eb06dab1044973bce2628b2b9e2eaa
-
SHA512
902b039b2f971f3e7479a6c8a1d6176ad49c904339746bdc1150cc74b73b7843bc94004682955a2f62b5c13aa048ce01e3bc23a0c0f680c223d187f0ca8117dd
-
SSDEEP
6144:cYdctSOvIaXXPsZxbNSSofCluJUskeDMgazqvkw:pitS8XXMffzu0eDGqr
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-