General
-
Target
fe779878cbea958f6edba5361e2f593b2c20edb75bec28f663bafc649effb359N.exe
-
Size
1.4MB
-
Sample
250117-sw4p5atrgq
-
MD5
1e209fdc3bcf2ecd44050761a550b970
-
SHA1
44e8b42fb2302493b9df1b886d38306a88b83472
-
SHA256
fe779878cbea958f6edba5361e2f593b2c20edb75bec28f663bafc649effb359
-
SHA512
412d7b4b20333e9b8db41ea89a9d9c47bee6cfca6fcdb93b2c477fc6eae40d0a79043a2c727bb2a8bebea0a75ce121e7d0d9d582a89143ccf612a9ee8ef04eb4
-
SSDEEP
24576:UBxkAUaE5ZOev1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:YWaEzBjLoyEkmZ9Y14
Static task
static1
Behavioral task
behavioral1
Sample
fe779878cbea958f6edba5361e2f593b2c20edb75bec28f663bafc649effb359N.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://2.59.254.19/noko/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
fe779878cbea958f6edba5361e2f593b2c20edb75bec28f663bafc649effb359N.exe
-
Size
1.4MB
-
MD5
1e209fdc3bcf2ecd44050761a550b970
-
SHA1
44e8b42fb2302493b9df1b886d38306a88b83472
-
SHA256
fe779878cbea958f6edba5361e2f593b2c20edb75bec28f663bafc649effb359
-
SHA512
412d7b4b20333e9b8db41ea89a9d9c47bee6cfca6fcdb93b2c477fc6eae40d0a79043a2c727bb2a8bebea0a75ce121e7d0d9d582a89143ccf612a9ee8ef04eb4
-
SSDEEP
24576:UBxkAUaE5ZOev1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:YWaEzBjLoyEkmZ9Y14
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-