General
-
Target
4380d738f4b7f309c68df40c3a1690c01b3fa8b59159f1fb5019b81e5582f417
-
Size
696KB
-
Sample
241121-yh6v8azner
-
MD5
7be7b72ea0f610ca28c46a0583d79089
-
SHA1
0d52d743184cf08bec3c3e551dc98562a7d4623e
-
SHA256
4380d738f4b7f309c68df40c3a1690c01b3fa8b59159f1fb5019b81e5582f417
-
SHA512
c5c02b88f2a644ac6e43a054e7236768e8ad27e116c17db24b8ea450ef8994fcb0ee048fe18394e318de87d0d092a5ea3c5e114ce2f087a2c04f5f62c5a417af
-
SSDEEP
12288:sLTcphRNzB0WONCWb2gb3IU3P+3DlLNXv3Pwan/ZLP+O+IZVK13O1OcaFlSNS:s8phRNl0NsO9f0DlZXv/wadPGIw38aQS
Static task
static1
Behavioral task
behavioral1
Sample
4380d738f4b7f309c68df40c3a1690c01b3fa8b59159f1fb5019b81e5582f417.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://qtd8gcdoplav737wretjqmaiy.tk/pato/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
4380d738f4b7f309c68df40c3a1690c01b3fa8b59159f1fb5019b81e5582f417
-
Size
696KB
-
MD5
7be7b72ea0f610ca28c46a0583d79089
-
SHA1
0d52d743184cf08bec3c3e551dc98562a7d4623e
-
SHA256
4380d738f4b7f309c68df40c3a1690c01b3fa8b59159f1fb5019b81e5582f417
-
SHA512
c5c02b88f2a644ac6e43a054e7236768e8ad27e116c17db24b8ea450ef8994fcb0ee048fe18394e318de87d0d092a5ea3c5e114ce2f087a2c04f5f62c5a417af
-
SSDEEP
12288:sLTcphRNzB0WONCWb2gb3IU3P+3DlLNXv3Pwan/ZLP+O+IZVK13O1OcaFlSNS:s8phRNl0NsO9f0DlZXv/wadPGIw38aQS
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-