General
-
Target
rPedidodecompra__PO20441__ARIMComponentes.exe
-
Size
463KB
-
Sample
241024-sjynca1ajc
-
MD5
13a22d03a02d5ba40e7865b1595db7a2
-
SHA1
93fabdf07e6ed1c0316ebb5db63b28e041586e46
-
SHA256
088bb7500d35c7ab73827301e505660559437479ef46312c3ee08b6253f35953
-
SHA512
3b7c6f7d38eab796f043c8545ff1bf870e24d7f145df5593ab572bde1f423a242165314e4ec93ca69c13b41ffe86d2d6ee76d633ef9fc98f21f16eb868368d1d
-
SSDEEP
6144:G9BrS6At7sb8op6Jncp3PIRQBVgbFgLIklqKgZ3zWOlCV3LG50vVzVpTT:kM4QoRpB+bGfjclCV3Li09zDT
Static task
static1
Behavioral task
behavioral1
Sample
rPedidodecompra__PO20441__ARIMComponentes.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
https://dddotx.shop/Mine/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
rPedidodecompra__PO20441__ARIMComponentes.exe
-
Size
463KB
-
MD5
13a22d03a02d5ba40e7865b1595db7a2
-
SHA1
93fabdf07e6ed1c0316ebb5db63b28e041586e46
-
SHA256
088bb7500d35c7ab73827301e505660559437479ef46312c3ee08b6253f35953
-
SHA512
3b7c6f7d38eab796f043c8545ff1bf870e24d7f145df5593ab572bde1f423a242165314e4ec93ca69c13b41ffe86d2d6ee76d633ef9fc98f21f16eb868368d1d
-
SSDEEP
6144:G9BrS6At7sb8op6Jncp3PIRQBVgbFgLIklqKgZ3zWOlCV3LG50vVzVpTT:kM4QoRpB+bGfjclCV3Li09zDT
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-