General
-
Target
c6443583802b1b19120a4e40d6a904b789397274eed1cc892f58086fc48e2af2.exe
-
Size
541KB
-
Sample
241002-bzz3nsvapa
-
MD5
2a1f30757144052d5b5fbe99232d6e5a
-
SHA1
88dd7267c531ff0309d83869b079f378c7e51ef3
-
SHA256
c6443583802b1b19120a4e40d6a904b789397274eed1cc892f58086fc48e2af2
-
SHA512
717e72d516d06a9f837a17262516f2af19ba1f91c1ed4d7212c1328be805b9ed8dc544d7c6caaf34993d48e0400acb8248ca2513860b6f949e07dd049ded2db2
-
SSDEEP
12288:bfAqPr584x+Mh89sw+ncw50149Sg6oSuJ8nwp4nxC93Nrkkz:MqN86+m8lEx0gSKNrkkz
Static task
static1
Behavioral task
behavioral1
Sample
c6443583802b1b19120a4e40d6a904b789397274eed1cc892f58086fc48e2af2.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://solutviewmen.viewdns.net/bdifygidj/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
c6443583802b1b19120a4e40d6a904b789397274eed1cc892f58086fc48e2af2.exe
-
Size
541KB
-
MD5
2a1f30757144052d5b5fbe99232d6e5a
-
SHA1
88dd7267c531ff0309d83869b079f378c7e51ef3
-
SHA256
c6443583802b1b19120a4e40d6a904b789397274eed1cc892f58086fc48e2af2
-
SHA512
717e72d516d06a9f837a17262516f2af19ba1f91c1ed4d7212c1328be805b9ed8dc544d7c6caaf34993d48e0400acb8248ca2513860b6f949e07dd049ded2db2
-
SSDEEP
12288:bfAqPr584x+Mh89sw+ncw50149Sg6oSuJ8nwp4nxC93Nrkkz:MqN86+m8lEx0gSKNrkkz
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-