General
-
Target
04122024_1415_Objednávka_(PO40512)_Pure System_S.R.O.exe.iso
-
Size
230KB
-
Sample
241204-rkxa8ssrcp
-
MD5
49ede6cfb5e6726e7d24b7d21949f80d
-
SHA1
7210969cea342a8adfe004d495fd01a35dab889b
-
SHA256
c6af383ac24bc7e003ccfd557d3357319f12499512968f35d27b61ac501bb4ab
-
SHA512
a2529824a9c2f37faf30fa6a708b4d99999822a5560cc70f6adcece99509cbad2be00999bdf9a746b0d7965fc73a9f2e58b4a54df5cfc44a99fe373d1df9d9e5
-
SSDEEP
3072:mffoPJAeYUSQzvNv9xyjGBBNt82hVxbwU+TzwOdCDA:moPZgQztPR+2hVxbwU+T7QD
Static task
static1
Behavioral task
behavioral1
Sample
Objednávka_(PO40512)_Pure System_S.R.O.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
https://ddrtot.shop/MV3/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Objednávka_(PO40512)_Pure System_S.R.O.exe
-
Size
169KB
-
MD5
1fa5dff7a4261c87879a0aad6e5d8b8e
-
SHA1
4860084fb13c0023878b6dc05a946e61e733ac6f
-
SHA256
5e81c76118cd8381b30390ad67d3b22bd36fe5ed027535a07e06cb2b4b960b66
-
SHA512
0e8f58aefe7613c8ef89ac7acaca13313e2a762f474fd7ac757cafb74608c1c277d2cb3039d253507e3cf5e6c9935abe55ec56750bf05bd68f19da8bd9843377
-
SSDEEP
3072:HffoPJAeYUSQzvNv9xyjGBBNt82hVxbwU+TzwOdCDA:XoPZgQztPR+2hVxbwU+T7QD
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-