General
-
Target
e315fec2444193710a49beda0e365f4fe37655960401b51a4e229882ab1659c4
-
Size
127KB
-
Sample
241204-ph8kdavpez
-
MD5
7a89d412394bde44f076eff1ae20eacb
-
SHA1
346b708909baa5e7520baaff47849e7e08df868c
-
SHA256
e315fec2444193710a49beda0e365f4fe37655960401b51a4e229882ab1659c4
-
SHA512
07eb960d1a8090b6e83955d1a76650015d78cda7473e8ffef62a190b52ce29be063131e6252e6ad627e4bae35f03d4f4dcb4e5136b44f589bb67f232a5a4d746
-
SSDEEP
3072:N1PFtwpeqCEmzv7v9xYjkBBNt82hVx9wI+T9wO5w/LIx:N19tw09zTlR+2hVx9wI+T1a/Mx
Static task
static1
Behavioral task
behavioral1
Sample
Objednávka_(PO40512)_Pure System_S.R.O.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
https://ddrtot.shop/MV3/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Objednávka_(PO40512)_Pure System_S.R.O.exe
-
Size
169KB
-
MD5
1fa5dff7a4261c87879a0aad6e5d8b8e
-
SHA1
4860084fb13c0023878b6dc05a946e61e733ac6f
-
SHA256
5e81c76118cd8381b30390ad67d3b22bd36fe5ed027535a07e06cb2b4b960b66
-
SHA512
0e8f58aefe7613c8ef89ac7acaca13313e2a762f474fd7ac757cafb74608c1c277d2cb3039d253507e3cf5e6c9935abe55ec56750bf05bd68f19da8bd9843377
-
SSDEEP
3072:HffoPJAeYUSQzvNv9xyjGBBNt82hVxbwU+TzwOdCDA:XoPZgQztPR+2hVxbwU+T7QD
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-