General
-
Target
fc05c8cd30f572b0db13bc5189c99ce499f133f7b65167c06518638c26623a81
-
Size
496KB
-
Sample
241113-jqcj1sxkct
-
MD5
fa439f9a3a801f167e9bfce0c28e97ac
-
SHA1
607b7c6aeef7d310c14c59bb0b1c7f3c77d1a481
-
SHA256
fc05c8cd30f572b0db13bc5189c99ce499f133f7b65167c06518638c26623a81
-
SHA512
a10348bf3b54161470bdc5e50aa56087ba7f9170666c44bc3139bff985f6a034ed004fb389a02c07958f7370639aea84d2f3b7004bb2553c8852f9e7aac822c3
-
SSDEEP
12288:xH0nsDsfvMZ2sWBNkdNyfsOV+qcX8oeLPkpDVTlUVm:xUnL3y+Oy0OV+PYkphlUV
Static task
static1
Behavioral task
behavioral1
Sample
fc05c8cd30f572b0db13bc5189c99ce499f133f7b65167c06518638c26623a81.exe
Resource
win7-20241010-en
Malware Config
Extracted
lokibot
http://94.156.177.220/ty/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
fc05c8cd30f572b0db13bc5189c99ce499f133f7b65167c06518638c26623a81
-
Size
496KB
-
MD5
fa439f9a3a801f167e9bfce0c28e97ac
-
SHA1
607b7c6aeef7d310c14c59bb0b1c7f3c77d1a481
-
SHA256
fc05c8cd30f572b0db13bc5189c99ce499f133f7b65167c06518638c26623a81
-
SHA512
a10348bf3b54161470bdc5e50aa56087ba7f9170666c44bc3139bff985f6a034ed004fb389a02c07958f7370639aea84d2f3b7004bb2553c8852f9e7aac822c3
-
SSDEEP
12288:xH0nsDsfvMZ2sWBNkdNyfsOV+qcX8oeLPkpDVTlUVm:xUnL3y+Oy0OV+PYkphlUV
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-