General
-
Target
0d352edbb8bb7d0f22cd838fdbc6295d2edec57f42a890e7fe8358a2c91fb584N.exe
-
Size
949KB
-
Sample
250205-g5za8atnht
-
MD5
d7f64f1fdd3e0d3573d44cf34c972040
-
SHA1
eecabd6e28a31e07b77b8ab3519b6279e5f2cbc5
-
SHA256
0d352edbb8bb7d0f22cd838fdbc6295d2edec57f42a890e7fe8358a2c91fb584
-
SHA512
1195116733365641b6f43499cd725a89904244b73d3148a58759181136c30d1e0c71af735028998bd3f8808c300b0db46bdce007c5e158d73bd45441bb8881aa
-
SSDEEP
24576:SAHnh+eWsN3skA4RV1Hom2KXFmIa9X5usZKtl5:Vh+ZkldoPK1Xa9X8sZA
Static task
static1
Behavioral task
behavioral1
Sample
0d352edbb8bb7d0f22cd838fdbc6295d2edec57f42a890e7fe8358a2c91fb584N.exe
Resource
win7-20241023-en
Malware Config
Extracted
lokibot
http://royalsailtravel.ru/Sacc/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
0d352edbb8bb7d0f22cd838fdbc6295d2edec57f42a890e7fe8358a2c91fb584N.exe
-
Size
949KB
-
MD5
d7f64f1fdd3e0d3573d44cf34c972040
-
SHA1
eecabd6e28a31e07b77b8ab3519b6279e5f2cbc5
-
SHA256
0d352edbb8bb7d0f22cd838fdbc6295d2edec57f42a890e7fe8358a2c91fb584
-
SHA512
1195116733365641b6f43499cd725a89904244b73d3148a58759181136c30d1e0c71af735028998bd3f8808c300b0db46bdce007c5e158d73bd45441bb8881aa
-
SSDEEP
24576:SAHnh+eWsN3skA4RV1Hom2KXFmIa9X5usZKtl5:Vh+ZkldoPK1Xa9X8sZA
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-