General
-
Target
481d35dd2f799eae40ecf9965a7c41b2aec41770260870199f2188fb728e49c6.exe
-
Size
589KB
-
Sample
241030-cvpa2svdml
-
MD5
5b32b5fe0f3951bc2e461920ec122e82
-
SHA1
29dcc718a1faed5e8cc9ec8757709bf2617ad614
-
SHA256
481d35dd2f799eae40ecf9965a7c41b2aec41770260870199f2188fb728e49c6
-
SHA512
da8c559b711d431603bb8c162d96d90c5cb2a23ac16343b9e15bda605e8237544f4fb1cedf10d81feb1fdbe52db554bb1970a48ebc7b3efb1d84b301c457f23c
-
SSDEEP
12288:s9ELrageAlkOnJhgBP1iCHvW4bFFfqI94j76x:/FnbgK8+4ZFfqIqK
Static task
static1
Behavioral task
behavioral1
Sample
481d35dd2f799eae40ecf9965a7c41b2aec41770260870199f2188fb728e49c6.exe
Resource
win7-20241023-en
Malware Config
Extracted
lokibot
https://ghcopz.shop/ClarkB/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
481d35dd2f799eae40ecf9965a7c41b2aec41770260870199f2188fb728e49c6.exe
-
Size
589KB
-
MD5
5b32b5fe0f3951bc2e461920ec122e82
-
SHA1
29dcc718a1faed5e8cc9ec8757709bf2617ad614
-
SHA256
481d35dd2f799eae40ecf9965a7c41b2aec41770260870199f2188fb728e49c6
-
SHA512
da8c559b711d431603bb8c162d96d90c5cb2a23ac16343b9e15bda605e8237544f4fb1cedf10d81feb1fdbe52db554bb1970a48ebc7b3efb1d84b301c457f23c
-
SSDEEP
12288:s9ELrageAlkOnJhgBP1iCHvW4bFFfqI94j76x:/FnbgK8+4ZFfqIqK
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-