General
-
Target
300283ba8da7125158564e591e688d3cc473695869efd5481bb853b8fd40b479
-
Size
169KB
-
Sample
241114-kx8rgawkcw
-
MD5
3552e39a925c73d39b425786bd952067
-
SHA1
2c006ab56e5baa51912e64192b831a10f985a4c9
-
SHA256
300283ba8da7125158564e591e688d3cc473695869efd5481bb853b8fd40b479
-
SHA512
6fc5eb232aa7084da624a5f451315bc696ba56aca1f036b04496e3330732ed6123bbb47af3070d0a68d0f52021816b737a04b5316c0c46438aa7e4caef712f85
-
SSDEEP
3072:hwflMmlIAGJ88xU1zYNih0FNplQOXjmOpcFx9omvlaaWgH7PMoxLwP:qNMmV8K1zY8uF3KOXEF5vlJ70oaP
Static task
static1
Behavioral task
behavioral1
Sample
Objednávka_(PO327010)_SLOVIZOL_S.R.O.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
https://ddrtot.shop/MV3/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Objednávka_(PO327010)_SLOVIZOL_S.R.O.exe
-
Size
297KB
-
MD5
f2e32e33daa66e9cd593d80b9c40e82f
-
SHA1
824c23212249c7fda010e3c5895252f62b1ffdd2
-
SHA256
d59042fb9666d5a2fcb62371be2ab5c51b708f27db5711659d6b6d54e261741e
-
SHA512
d6653a03cfba452a4441639e9c35d974675576d786bf19e7b3e96aeb01c61200e2c758fb5fb4ac637111b93fa5e1bfea199623c82333987a54bcfb00cd3cc218
-
SSDEEP
3072:hhEhB7dX8JhdSFETqgcFKy3owG9ih0JNplQMXj8Orctx9oQvl4aWgV7PXr1S7XWP:EhHodSFUdSLuJ3KMX8tVvl57v
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-