General
-
Target
d859b658417fc5c9aaf0d48deb3ff84420107c9419b4fe2b95a1079e711ac432.exe
-
Size
699KB
-
Sample
241122-xf68jawmex
-
MD5
38207dadf8e4e4b1767fa92ac77be33a
-
SHA1
77cc947be7e5acc239cf176d108ccca91555d5c6
-
SHA256
d859b658417fc5c9aaf0d48deb3ff84420107c9419b4fe2b95a1079e711ac432
-
SHA512
5f6dc5e247f7088b142c6eea2248f5c48f09f47336eaf98df05b0c164bbf387e084d2dfea41a8b2973cab166e2c937346e4e0e766223e6fed5b454ab6f806b4b
-
SSDEEP
12288:uB2zj/+CrtawWTlTmLkHN6DSG8cFaVVfRYDEF/ct7oSFduBCTb6HIALUdXVfIy6:HaC0wIlTWkHoDfFabRYDEFk5oSX4CTWD
Static task
static1
Behavioral task
behavioral1
Sample
d859b658417fc5c9aaf0d48deb3ff84420107c9419b4fe2b95a1079e711ac432.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://smartcamainpowerizman.sytes.net/ioknfbgj/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d859b658417fc5c9aaf0d48deb3ff84420107c9419b4fe2b95a1079e711ac432.exe
-
Size
699KB
-
MD5
38207dadf8e4e4b1767fa92ac77be33a
-
SHA1
77cc947be7e5acc239cf176d108ccca91555d5c6
-
SHA256
d859b658417fc5c9aaf0d48deb3ff84420107c9419b4fe2b95a1079e711ac432
-
SHA512
5f6dc5e247f7088b142c6eea2248f5c48f09f47336eaf98df05b0c164bbf387e084d2dfea41a8b2973cab166e2c937346e4e0e766223e6fed5b454ab6f806b4b
-
SSDEEP
12288:uB2zj/+CrtawWTlTmLkHN6DSG8cFaVVfRYDEF/ct7oSFduBCTb6HIALUdXVfIy6:HaC0wIlTWkHoDfFabRYDEFk5oSX4CTWD
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-