General
-
Target
d59042fb9666d5a2fcb62371be2ab5c51b708f27db5711659d6b6d54e261741e.exe
-
Size
297KB
-
Sample
241205-taq3ks1lfy
-
MD5
f2e32e33daa66e9cd593d80b9c40e82f
-
SHA1
824c23212249c7fda010e3c5895252f62b1ffdd2
-
SHA256
d59042fb9666d5a2fcb62371be2ab5c51b708f27db5711659d6b6d54e261741e
-
SHA512
d6653a03cfba452a4441639e9c35d974675576d786bf19e7b3e96aeb01c61200e2c758fb5fb4ac637111b93fa5e1bfea199623c82333987a54bcfb00cd3cc218
-
SSDEEP
3072:hhEhB7dX8JhdSFETqgcFKy3owG9ih0JNplQMXj8Orctx9oQvl4aWgV7PXr1S7XWP:EhHodSFUdSLuJ3KMX8tVvl57v
Static task
static1
Behavioral task
behavioral1
Sample
d59042fb9666d5a2fcb62371be2ab5c51b708f27db5711659d6b6d54e261741e.exe
Resource
win7-20240729-en
Malware Config
Extracted
lokibot
https://ddrtot.shop/MV3/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d59042fb9666d5a2fcb62371be2ab5c51b708f27db5711659d6b6d54e261741e.exe
-
Size
297KB
-
MD5
f2e32e33daa66e9cd593d80b9c40e82f
-
SHA1
824c23212249c7fda010e3c5895252f62b1ffdd2
-
SHA256
d59042fb9666d5a2fcb62371be2ab5c51b708f27db5711659d6b6d54e261741e
-
SHA512
d6653a03cfba452a4441639e9c35d974675576d786bf19e7b3e96aeb01c61200e2c758fb5fb4ac637111b93fa5e1bfea199623c82333987a54bcfb00cd3cc218
-
SSDEEP
3072:hhEhB7dX8JhdSFETqgcFKy3owG9ih0JNplQMXj8Orctx9oQvl4aWgV7PXr1S7XWP:EhHodSFUdSLuJ3KMX8tVvl57v
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-