General
-
Target
2eb958479e676f4b36df8268b32fc222f5d05828874b7e26af00539f846044b9
-
Size
458KB
-
Sample
241113-dd53xavhrj
-
MD5
012478d8e412700351aa03267faba7f3
-
SHA1
2bee3862f7c59686c299b1f0ce57dfc6e8d998dc
-
SHA256
2eb958479e676f4b36df8268b32fc222f5d05828874b7e26af00539f846044b9
-
SHA512
e584076e0eef176c7932b3af227a25ccb7bd74406bf143cfb111a1afab0149401f819cb09c0013fbbcfab058408b6fe0d0e2cadc989325e525919d19a875901f
-
SSDEEP
6144:2yu1+Rvj57qEa3sfU/PkrWd48puwrHL1v82hqFGi1Uyak4xkurjWj4WO+7frqo9i:50+Rvjda3t050RvNI3+8OTenOefhqkw
Static task
static1
Behavioral task
behavioral1
Sample
illusional.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
illusional.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lokibot
http://94.156.177.95/ty/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
illusional.exe
-
Size
947KB
-
MD5
3599b206ca6db709ff27cfd3e166927f
-
SHA1
d24858ab6871afbf898dfac4e7394b617de9cfa3
-
SHA256
100eedcad49d3d49eefaf91c95dd38cc213f621bbdde5af185a8657ad6f89891
-
SHA512
33b8bdbf0e0a155bf58c521b2705d8e13e6e19b4b82ccc57d6d38a6d9a5798f2e788cb80a5eb2700a45c408a64ce0dc3f0b4def6dabf15922da08d342ce34e75
-
SSDEEP
24576:btb20pkaCqT5TBWgNQ7arHtj+/Q4kf5b6A:YVg5tQ7aZjH4kfd5
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-