General
-
Target
ec484a7c4eeef16d3277cad798a5b408b7f50fa0c8b4d7f1b81cb2083db2886c.exe
-
Size
239KB
-
Sample
240916-b77sgstaph
-
MD5
df4d6780bdeac7cef2ac001885c9cdd5
-
SHA1
0b9d5b150288939f76e5493ca99e688753404bd8
-
SHA256
ec484a7c4eeef16d3277cad798a5b408b7f50fa0c8b4d7f1b81cb2083db2886c
-
SHA512
943d3c35e3e39d663233e4c2051ebf2605a048d135e3ebeea3f16d42ae9cc4ee9e19f30fff1ac4dee75451e7cc88628a2dde171841bb8f7f218bc4e9dcfa69f1
-
SSDEEP
6144:MKZ7a8ORKixm27YQdxDBtlngZSu0BUy7bCY:t7a8OKid7JdZJn8Jy7bCY
Static task
static1
Behavioral task
behavioral1
Sample
ec484a7c4eeef16d3277cad798a5b408b7f50fa0c8b4d7f1b81cb2083db2886c.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ec484a7c4eeef16d3277cad798a5b408b7f50fa0c8b4d7f1b81cb2083db2886c.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://31.220.40.22/~bvcgroup/invalid/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
ec484a7c4eeef16d3277cad798a5b408b7f50fa0c8b4d7f1b81cb2083db2886c.exe
-
Size
239KB
-
MD5
df4d6780bdeac7cef2ac001885c9cdd5
-
SHA1
0b9d5b150288939f76e5493ca99e688753404bd8
-
SHA256
ec484a7c4eeef16d3277cad798a5b408b7f50fa0c8b4d7f1b81cb2083db2886c
-
SHA512
943d3c35e3e39d663233e4c2051ebf2605a048d135e3ebeea3f16d42ae9cc4ee9e19f30fff1ac4dee75451e7cc88628a2dde171841bb8f7f218bc4e9dcfa69f1
-
SSDEEP
6144:MKZ7a8ORKixm27YQdxDBtlngZSu0BUy7bCY:t7a8OKid7JdZJn8Jy7bCY
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-