General
-
Target
55ebf196cba46b86e7fda020d3fa9e0c7746ff82522b7e50bd2321c43c6c959b.exe
-
Size
433KB
-
Sample
241121-zka21axnax
-
MD5
a7ed6cdb35af2a1afb12b659f8daf975
-
SHA1
79ff1a831996a41f63cd4fbd20b09472b4b596c5
-
SHA256
55ebf196cba46b86e7fda020d3fa9e0c7746ff82522b7e50bd2321c43c6c959b
-
SHA512
9a54a1a4db5be77eee39c1e5fd43696631c97256624ffe1c8a2a497acd6105906eef09812dfa72cd26419cbf81357b3476f31a8bab34c7292fdbdbb67b130ff8
-
SSDEEP
6144:qGxhL+IB/vGCLP4R01wE2WgQdpfa9wLrI3RHOo/+I:j5ZfTw05HVwaqEoGI
Static task
static1
Behavioral task
behavioral1
Sample
55ebf196cba46b86e7fda020d3fa9e0c7746ff82522b7e50bd2321c43c6c959b.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://37.0.10.225/greg/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
55ebf196cba46b86e7fda020d3fa9e0c7746ff82522b7e50bd2321c43c6c959b.exe
-
Size
433KB
-
MD5
a7ed6cdb35af2a1afb12b659f8daf975
-
SHA1
79ff1a831996a41f63cd4fbd20b09472b4b596c5
-
SHA256
55ebf196cba46b86e7fda020d3fa9e0c7746ff82522b7e50bd2321c43c6c959b
-
SHA512
9a54a1a4db5be77eee39c1e5fd43696631c97256624ffe1c8a2a497acd6105906eef09812dfa72cd26419cbf81357b3476f31a8bab34c7292fdbdbb67b130ff8
-
SSDEEP
6144:qGxhL+IB/vGCLP4R01wE2WgQdpfa9wLrI3RHOo/+I:j5ZfTw05HVwaqEoGI
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-