General
-
Target
061a33aa08098c3106dfa56feab3da9dd7ffcf9800df9d65c3b57ec09afaa853
-
Size
138KB
-
Sample
241112-p2yvaashqg
-
MD5
38deb8bc1fcb5ef2a8ce238aa58f325d
-
SHA1
ce432e5e8315d40844e042337063863e4000a91c
-
SHA256
061a33aa08098c3106dfa56feab3da9dd7ffcf9800df9d65c3b57ec09afaa853
-
SHA512
17b6d194c3a379d0f6bb3c580424002f1cea32b36f9390b1f7fff69ce3d96cc9c1d1f988000c3787e3f16ac40d6342ff493d7459aed99b27da8981ecab4a5c26
-
SSDEEP
3072:TKlELfSzjjFM9DWVPXykeYE0chyla0lQmPqwXIOAXRw97m/WLV:ffSHjFaiV6lV0L//P4X6JWWZ
Static task
static1
Behavioral task
behavioral1
Sample
Naročilo za november _(PO547003)_TEAM TRADE.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
https://rottot.shop/Mx2/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Naročilo za november _(PO547003)_TEAM TRADE.exe
-
Size
190KB
-
MD5
38c4c24fe6d56d132f56b78d35bb2995
-
SHA1
321871ea29e00e4999310d8508159d312948338d
-
SHA256
f1222c9d3f97a818d15fbbf968307d5f0255e0457d30a94b5f2d644099b001a9
-
SHA512
30a704b3dc8b4e41e082099bad857d49c53e960303c9bc0a40cfa0eab2f1c329f5180c11d36265ad9fb4b42392790aa300f9dd90251b84e1716d3ea3ab944217
-
SSDEEP
3072:bnZhL41lHaLNSLS8U3fFaxFM9D2VPXWkeYy0chSl+0lQmPMwXIUAXRw9+eD:NhLY6pSKGFaqVOlN05X/PqX6Qe
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-