General
-
Target
tmp5j4kfgu0
-
Size
190KB
-
Sample
241112-mtc7hazmcv
-
MD5
38c4c24fe6d56d132f56b78d35bb2995
-
SHA1
321871ea29e00e4999310d8508159d312948338d
-
SHA256
f1222c9d3f97a818d15fbbf968307d5f0255e0457d30a94b5f2d644099b001a9
-
SHA512
30a704b3dc8b4e41e082099bad857d49c53e960303c9bc0a40cfa0eab2f1c329f5180c11d36265ad9fb4b42392790aa300f9dd90251b84e1716d3ea3ab944217
-
SSDEEP
3072:bnZhL41lHaLNSLS8U3fFaxFM9D2VPXWkeYy0chSl+0lQmPMwXIUAXRw9+eD:NhLY6pSKGFaqVOlN05X/PqX6Qe
Static task
static1
Behavioral task
behavioral1
Sample
tmp5j4kfgu0.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
https://rottot.shop/Mx2/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
tmp5j4kfgu0
-
Size
190KB
-
MD5
38c4c24fe6d56d132f56b78d35bb2995
-
SHA1
321871ea29e00e4999310d8508159d312948338d
-
SHA256
f1222c9d3f97a818d15fbbf968307d5f0255e0457d30a94b5f2d644099b001a9
-
SHA512
30a704b3dc8b4e41e082099bad857d49c53e960303c9bc0a40cfa0eab2f1c329f5180c11d36265ad9fb4b42392790aa300f9dd90251b84e1716d3ea3ab944217
-
SSDEEP
3072:bnZhL41lHaLNSLS8U3fFaxFM9D2VPXWkeYy0chSl+0lQmPMwXIUAXRw9+eD:NhLY6pSKGFaqVOlN05X/PqX6Qe
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-