General
-
Target
8da520c11db02949950acfa98ff22e72eed80fa89957292dbf91b425bdd830f6.exe
-
Size
954KB
-
Sample
250130-dvz8zsxlb1
-
MD5
7a5916bd5c71370cb9f5504bc9b0e522
-
SHA1
2a33e0b1ec3ccd6470942b12cd2090751fe1b0df
-
SHA256
8da520c11db02949950acfa98ff22e72eed80fa89957292dbf91b425bdd830f6
-
SHA512
f0b080555a2fecb4fab08cddf25f7ab8a68dc7f67f468b58f301cd6ba7aab5edc14072d1006984c635e64967d21e09c45e34b7d3a7eed6c70d1085ea50243566
-
SSDEEP
24576:JAHnh+eWsN3skA4RV1Hom2KXFmIaA/3B4a5:Qh+ZkldoPK1XaA/xV
Static task
static1
Behavioral task
behavioral1
Sample
8da520c11db02949950acfa98ff22e72eed80fa89957292dbf91b425bdd830f6.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://royalsailtravel.ru/Sacc/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
8da520c11db02949950acfa98ff22e72eed80fa89957292dbf91b425bdd830f6.exe
-
Size
954KB
-
MD5
7a5916bd5c71370cb9f5504bc9b0e522
-
SHA1
2a33e0b1ec3ccd6470942b12cd2090751fe1b0df
-
SHA256
8da520c11db02949950acfa98ff22e72eed80fa89957292dbf91b425bdd830f6
-
SHA512
f0b080555a2fecb4fab08cddf25f7ab8a68dc7f67f468b58f301cd6ba7aab5edc14072d1006984c635e64967d21e09c45e34b7d3a7eed6c70d1085ea50243566
-
SSDEEP
24576:JAHnh+eWsN3skA4RV1Hom2KXFmIaA/3B4a5:Qh+ZkldoPK1XaA/xV
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-