General
-
Target
b2f5ff965b654a55eb5447226ef2e32090649e88eab9c82fcf9845e2f4dd2ac7
-
Size
537KB
-
Sample
250204-jmrvjasjfp
-
MD5
936f018faaed5148f8241e892d8e370e
-
SHA1
d3abacb2fff0935b401057a4f19deb77534832bd
-
SHA256
b2f5ff965b654a55eb5447226ef2e32090649e88eab9c82fcf9845e2f4dd2ac7
-
SHA512
421ee501605e4843732648f547d82622aabd45678a2a81d7648f4ae8bb6ff5366280bef6ba505589f13881d18cbd3ba1339f59117f0149c7e7c73141fc1db574
-
SSDEEP
12288:3cf4e2y/7dWqzsRnqU+Y7b34z7XKtfzSxsRZisZQFsOOxgFrfl:sfr2y/hWS8z34zjKhG+VZQFOCBt
Static task
static1
Behavioral task
behavioral1
Sample
specs_00235_xlsx.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://touxzw.ir/sccc/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
specs_00235_xlsx.exe
-
Size
960KB
-
MD5
3f9bb2bb89a2341a849f06b15c988664
-
SHA1
f8157d3b1cee8eac7345c2ba9f2ff35e07e06720
-
SHA256
5af27ed278e5ce156f4f6d305b260bdfcfe1d5702e81fe236312af12eb47a738
-
SHA512
79d9ca3ed90f18c7a480c8553971d6685af6c87be842773222ef5211345fb9b4069ec8d45871aac53274013c9b096bdb39910c953be035e71788076a0309ba82
-
SSDEEP
24576:CAHnh+eWsN3skA4RV1Hom2KXFmIa6c6VOsLCI5:Fh+ZkldoPK1Xa6Jn
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-