General
-
Target
e76d55b456c40a2cabd8a4fc1e261deaf73b50683d9e06527cf4cd7321570a2eN
-
Size
547KB
-
Sample
241027-gftdnsvhmr
-
MD5
ec26d777a5eae8ea6fe66f8ce930d5a0
-
SHA1
a9f849f2a5248e46cbbb05169367c31923d7e704
-
SHA256
e76d55b456c40a2cabd8a4fc1e261deaf73b50683d9e06527cf4cd7321570a2e
-
SHA512
288a17bdef3e517d1cb6e27c14fd281e4b0c5805dfe91c1e333b7dd5aee9fc049a71409db2b96ae684027b12ed113a2b38ac9969acdb3651fb7a65715d4b42e4
-
SSDEEP
12288:/YV6MorX7qzuC3QHO9FQVHPF51jgc54TfIbtm/2XjnCBLfxkK:MBXu9HGaVH56o42zRK
Behavioral task
behavioral1
Sample
e76d55b456c40a2cabd8a4fc1e261deaf73b50683d9e06527cf4cd7321570a2eN.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://185.34.52.14/soolo/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
e76d55b456c40a2cabd8a4fc1e261deaf73b50683d9e06527cf4cd7321570a2eN
-
Size
547KB
-
MD5
ec26d777a5eae8ea6fe66f8ce930d5a0
-
SHA1
a9f849f2a5248e46cbbb05169367c31923d7e704
-
SHA256
e76d55b456c40a2cabd8a4fc1e261deaf73b50683d9e06527cf4cd7321570a2e
-
SHA512
288a17bdef3e517d1cb6e27c14fd281e4b0c5805dfe91c1e333b7dd5aee9fc049a71409db2b96ae684027b12ed113a2b38ac9969acdb3651fb7a65715d4b42e4
-
SSDEEP
12288:/YV6MorX7qzuC3QHO9FQVHPF51jgc54TfIbtm/2XjnCBLfxkK:MBXu9HGaVH56o42zRK
-
Lokibot family
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-