General
-
Target
e789175aa3f21ce7173472364db1c7973bea6af7f074e20e573d105e62031a66.iso
-
Size
524KB
-
Sample
241025-cywvastaqp
-
MD5
988ea1e1c3bdb4c4d3e9418fa3f58798
-
SHA1
2d4da8fe11d0c2e87b3d99e9cc7629ae06fe5cd0
-
SHA256
e789175aa3f21ce7173472364db1c7973bea6af7f074e20e573d105e62031a66
-
SHA512
cb0e1781eef93783f177abf903e46ef87b87bf44bb6a7d1d986cf687a1b2bdac4d1e28e5d4e86cb4abc46562d4bfaf1cd87e713fdb7d30c8bca5034a4a71b015
-
SSDEEP
6144:v9BrS6At7sb8op6Jncp3PIRQBVgbFgLIklqKgZ3zWOlCV3LG50vVzVpTT:PM4QoRpB+bGfjclCV3Li09zDT
Static task
static1
Behavioral task
behavioral1
Sample
Pedido de compra_(PO20441)_ARIM Componentes.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
https://dddotx.shop/Mine/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Pedido de compra_(PO20441)_ARIM Componentes.exe
-
Size
463KB
-
MD5
13a22d03a02d5ba40e7865b1595db7a2
-
SHA1
93fabdf07e6ed1c0316ebb5db63b28e041586e46
-
SHA256
088bb7500d35c7ab73827301e505660559437479ef46312c3ee08b6253f35953
-
SHA512
3b7c6f7d38eab796f043c8545ff1bf870e24d7f145df5593ab572bde1f423a242165314e4ec93ca69c13b41ffe86d2d6ee76d633ef9fc98f21f16eb868368d1d
-
SSDEEP
6144:G9BrS6At7sb8op6Jncp3PIRQBVgbFgLIklqKgZ3zWOlCV3LG50vVzVpTT:kM4QoRpB+bGfjclCV3Li09zDT
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-