General
-
Target
08012025_1416_NOGHCV09872.cmd.zip
-
Size
631KB
-
Sample
250108-rrnbxawkam
-
MD5
ae1bd1e06ff88c9756533df7e75a06aa
-
SHA1
17e532f821d219bde8615d1325d71a7709b6cbd0
-
SHA256
c675632edea307355c72ddcc06979b9bd2917fda95ee46e15e1bd58ebb67de8f
-
SHA512
d952ffc5afce04355880e3bd23598d0e70c424b94aeb4bbf0fd5c9517e6c36c67a304493c02420faae0acdefe38bc82807add2641ef1fc57f1d45ae2c0c727f9
-
SSDEEP
12288:JhOFpVmWTu/8vZLPocZNy+/wcx28VX64RnYpE1p9WLLWzlejY24UcQCrlX98kzZu:J0wUt5P5tBxRqqIbnLc2vtCrc+4
Behavioral task
behavioral1
Sample
NOGHCV09872.exe
Resource
win7-20241010-en
Malware Config
Extracted
lokibot
http://172.245.123.11/tpm/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
NOGHCV09872.cmd
-
Size
657KB
-
MD5
14d9c4ea1e0aac13bb62e8913e5f8738
-
SHA1
c062261875473ba241637085ceb3a33631f1b333
-
SHA256
3dea4c555b6118e7963f57a4415692dda5c644e5675c6117c2846808e833191b
-
SHA512
1307ae1b1dd1aaeda153530125abed639c293ce9dd8b09176b2650ff4d6494cc98c727e53799904608fd65ec0fdeb69b322d158a1a4ee3b0c4b5ac9e25ed5126
-
SSDEEP
12288:KsHzOUNUSB/o5LsI1uwajJ5yvv1l25AMp9WV3W1l+LYIgUg4Clln98jx:9iUmSB/o5d1ubcvj5JUInjCl4t
-
Lokibot family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-