General
-
Target
7d0f1be16b32d2ba79c7c195bc734d109c373f5c30eeb504a467f1b18699367d
-
Size
138KB
-
Sample
241112-r9gl3stnds
-
MD5
3718ac84d9400c3efbe7ddeb8f436fa0
-
SHA1
00ec1cdc85d6dd1321138318a76cea3b5924978d
-
SHA256
7d0f1be16b32d2ba79c7c195bc734d109c373f5c30eeb504a467f1b18699367d
-
SHA512
ec2e35ec676860c6546c7d648d5dfd06064ecfa986d18db2572c948375c8301f993e5e8fe94bf41adc156af1509214882e2742c73811cfaebef00a53f67178eb
-
SSDEEP
3072:AQq0D+tJWaDiBdSzj8FM9DQVPXKkeY+0chel+0lQmPIwXI6AXRw90U7zEW:laDMdSH8FasVSlj03b/PWX6uczt
Static task
static1
Behavioral task
behavioral1
Sample
Pirkimo užsakymas_(PO427015)_ LITELEKTRO.exe
Resource
win7-20241010-en
Malware Config
Extracted
lokibot
https://rottot.shop/Mx2/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Pirkimo užsakymas_(PO427015)_ LITELEKTRO.exe
-
Size
190KB
-
MD5
38c4c24fe6d56d132f56b78d35bb2995
-
SHA1
321871ea29e00e4999310d8508159d312948338d
-
SHA256
f1222c9d3f97a818d15fbbf968307d5f0255e0457d30a94b5f2d644099b001a9
-
SHA512
30a704b3dc8b4e41e082099bad857d49c53e960303c9bc0a40cfa0eab2f1c329f5180c11d36265ad9fb4b42392790aa300f9dd90251b84e1716d3ea3ab944217
-
SSDEEP
3072:bnZhL41lHaLNSLS8U3fFaxFM9D2VPXWkeYy0chSl+0lQmPMwXIUAXRw9+eD:NhLY6pSKGFaqVOlN05X/PqX6Qe
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-