General
-
Target
4ff724960d9d9066573de7e50cc4e2a3d08674b9c7cbcda5530787723e615e94
-
Size
130KB
-
Sample
241202-mm4qwawqhp
-
MD5
8f295e08f171eefe94355a458af0ee7f
-
SHA1
17e80117fd252bdb2d97228881bcf039603710a0
-
SHA256
4ff724960d9d9066573de7e50cc4e2a3d08674b9c7cbcda5530787723e615e94
-
SHA512
69bd0b81334a1ce7dbf50e5703ca74f99aa7b5f879cda9200ee0cd2563486fa3607e1caa570bdddcb45c271f6d5d4ff3b0dda00db2057f83ca6e1cc58bccfa0a
-
SSDEEP
3072:oOIr5UR/GMEPLr+aT71m1hN5P4/3ms3QEN+GNszoAMdjhTlN4lzjDZaE:xUXVr++kvxHEsGvAMR/N4NDf
Static task
static1
Behavioral task
behavioral1
Sample
Pirkuma pasūtījums_(PO40221)_Limega_UAB.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
https://ddrtot.shop/MV3/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Pirkuma pasūtījums_(PO40221)_Limega_UAB.exe
-
Size
225KB
-
MD5
9a5eb541f9df732ca5158c96cded4ae6
-
SHA1
9dc7a4e784e7c9cad8eecaaba56bf43e14d30599
-
SHA256
75173e92fd7a13e7be3ec177c5287280aae4d2a5e6911cd1458400d96289d18d
-
SHA512
a1e71885ce4e9b05b4075bc8164151109f19b7a6f15cacc09d7c25159f079e584ef525dfd31ea431cc0cb8a93f8950e2614771f769f90769ef55e5f70eceb52f
-
SSDEEP
3072:k9iIXdVtoSgo/GMEzLr+aTN1m1hN5P4h3ms3QEN+GNstgAMdjFTlN4l5jrVlWdL6:etWSg/Vr++ivxTEsGhAMRzN4nx
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-