General
-
Target
9ea0e62cdc6ec4e5a0c48f45e2c117632b84b09c6e84c9d89444aec6c2418e09.exe
-
Size
461KB
-
Sample
241121-zf3apaxmcz
-
MD5
7e31be8bc7f77a577e69f73c4f1177f7
-
SHA1
ad1b66a091ed9d81d4c5dc7238134350ab483562
-
SHA256
9ea0e62cdc6ec4e5a0c48f45e2c117632b84b09c6e84c9d89444aec6c2418e09
-
SHA512
a91a193db3b9a6e7bbd1afc2cf213fe1780fbb6640a6136baf7844d4e3f00ece401050b901c030c2cb37638f6c3362d2ee6760c493ba854cf58dbd348d94d98f
-
SSDEEP
12288:NJOr0Yb59iAIYhQZSjNx+bZzT4yoQ8BTjIzW62JVbY4:Ng7jC2nZtpbY4
Static task
static1
Behavioral task
behavioral1
Sample
9ea0e62cdc6ec4e5a0c48f45e2c117632b84b09c6e84c9d89444aec6c2418e09.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://87.120.113.235/18/pin.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
9ea0e62cdc6ec4e5a0c48f45e2c117632b84b09c6e84c9d89444aec6c2418e09.exe
-
Size
461KB
-
MD5
7e31be8bc7f77a577e69f73c4f1177f7
-
SHA1
ad1b66a091ed9d81d4c5dc7238134350ab483562
-
SHA256
9ea0e62cdc6ec4e5a0c48f45e2c117632b84b09c6e84c9d89444aec6c2418e09
-
SHA512
a91a193db3b9a6e7bbd1afc2cf213fe1780fbb6640a6136baf7844d4e3f00ece401050b901c030c2cb37638f6c3362d2ee6760c493ba854cf58dbd348d94d98f
-
SSDEEP
12288:NJOr0Yb59iAIYhQZSjNx+bZzT4yoQ8BTjIzW62JVbY4:Ng7jC2nZtpbY4
-
Lokibot family
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-