General
-
Target
7a67c5f3ebfe4608d1eba7d0884424d7093df2dc49487ff0488cdff5e021c885
-
Size
501KB
-
Sample
241126-k37rcs1kgk
-
MD5
ebdcb8b4df7cdabf965667c9dc00aae1
-
SHA1
2194b9de3b190e8ec6cb30bc311e27aa3502e352
-
SHA256
7a67c5f3ebfe4608d1eba7d0884424d7093df2dc49487ff0488cdff5e021c885
-
SHA512
42acbbfb9a9f716dfce38e04fb59eccc375f810a1b61daea114077cf4f3dd6a75da797add40e3e1f2813abf84c29b20aeb31952fd123d24eba5a8fdf6ed953ac
-
SSDEEP
12288:Bk2EiFnx2PynUCJXU9EGMuRCCYMmfgknmkWirVox2brqR8g9XghdHeE5:Bk2EiFilCS9T5KJmjiax2iqlv5
Behavioral task
behavioral1
Sample
Proforma Invoices Oct & Nov.exe
Resource
win7-20241010-en
Malware Config
Extracted
lokibot
http://94.156.177.41/alpha/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Proforma Invoices Oct & Nov.exe
-
Size
525KB
-
MD5
3102ded8150ab50942806fece47877d9
-
SHA1
0ea08a674c07a4f354ed7501788db4e3e17298c0
-
SHA256
c14f938d6e95748fc2a3102fad37c48cc3d720cbe43420822c1b6da13ed800f5
-
SHA512
4d18f8076876afe0a455350cf057e507324840235929557d6199d40d601df18dfe00ca96835a13cafddf429cbe9536f8db476e7f658ddaf764e8e906ec56a7de
-
SSDEEP
12288:DOv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPiUVrRGghXgLxH4oJ:Dq5TfcdHj4fmbVQN/J
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-