General
-
Target
fc4aad9d40fd128f669c23fd3cc95c05fda7b97b47192504aa3773fa112bb3c8
-
Size
501KB
-
Sample
241128-th1a8asmby
-
MD5
9f31734d6418e5a2fec7dbe601032173
-
SHA1
8e69a2865e54d7fa567829e848f3bc0d3a68eff7
-
SHA256
fc4aad9d40fd128f669c23fd3cc95c05fda7b97b47192504aa3773fa112bb3c8
-
SHA512
2e383e2a2c04c79fbddbbdceb9a8d08b2d10d59178dad1c15565b5b745f3ec84fdcd7e6807335c2a8f67a17086a460411239c03050dae4309108074482fe3df8
-
SSDEEP
12288:DjUtszs7cjujxPCGqfRCC2nkRaTA4QE9X1IXnV7bR:HVmfx9TkaTnRRW5bR
Behavioral task
behavioral1
Sample
Proforma Invoice.exe
Resource
win7-20240708-en
Malware Config
Extracted
lokibot
http://94.156.177.41/davinci/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Proforma Invoice.exe
-
Size
526KB
-
MD5
8a837ff22ac4b29071a8bb9a1990b2e1
-
SHA1
13325e7f017dbece8799c6a474c2b5c7869fce07
-
SHA256
6cca6d4fdb09556a47e58c002e227f93281ca6f7f553acd054e6ced27a124fad
-
SHA512
effa316f2428f9410e12f27f34d47fedcb807c12f86eee2f1e6ddf6f09a29765aecadca7488b2db33b70683e0cb2961134b7dbc3dccd82b50f1d5aa8cd3b20a3
-
SSDEEP
12288:+Ov5jKhsfoPA+yeVKUCUxP4C902bdRtJJPiv27j8JnB1a:+q5TfcdHj4fmbbMra
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-