General
-
Target
ba934973bca1c75b9bc1aa5a24e7f9dda6e65b9edbe2aacf6c763ba7b0f4d79b
-
Size
481KB
-
Sample
241120-s8w6taypew
-
MD5
471785b0e509d7758c27e9af0f5c6ea1
-
SHA1
ef1ad64e8e472fc687eec6feb70d08c2f4407c9a
-
SHA256
ba934973bca1c75b9bc1aa5a24e7f9dda6e65b9edbe2aacf6c763ba7b0f4d79b
-
SHA512
d71f03cf210d00f1953372583ddb02de66e2781ad3f0816c47a50ce3abc2ed800c641cba36033049021321901ba13fa0b7f797bb0f8a4c5ba7c74169b4cfba58
-
SSDEEP
12288:u92YbpwUSaQz7C0qvRAnoIzQlYAWXozVnpPNlZjW:MlS3SRC+WMPNlZjW
Behavioral task
behavioral1
Sample
FACTURA09876567000.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://87.120.113.235/18/pin.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
FACTURA09876567000.bat
-
Size
506KB
-
MD5
f4a43c4e63d1bc8908819fc2b3b6a83b
-
SHA1
03f88667ac44a41a2b5e4b2cf48f23302ae79b6c
-
SHA256
ecc61fe635e2cdb0859441ef90e330230094e7514cf00cb48829e136d713b63b
-
SHA512
6f1ce342403bc33f5dabfa0260da8f45bfd6d3bdfe72df20e0a617f71bf2abe926a29393d4a9e4621ee8a5ade029c20ed025fe377ab7c1d6f954f866c1efe76f
-
SSDEEP
12288:FOv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPi0Q/mXWb0zjnfxNNZjXO:Fq5TfcdHj4fmbjQOXQ0xNNZjXO
-
Lokibot family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-