General
-
Target
cfce371d906f21a018dc0ebc8272c669ae68e8a57f64fa41484c5fac14e3412e
-
Size
550KB
-
Sample
250219-fkmagsxpc1
-
MD5
260a37d78fc3178ef62ea8366fef7a5d
-
SHA1
763360f9a2232af8c9dce7e2684eb6e4c5820ec0
-
SHA256
cfce371d906f21a018dc0ebc8272c669ae68e8a57f64fa41484c5fac14e3412e
-
SHA512
7651e458d1ef0e592c0ea3eabf3251e43142b7a38ceeab3ede38a03407d515542ec96cd7cedfaa5c6129b8321abc58016310213c3654b701554ec031746062f7
-
SSDEEP
12288:w0hLZv/4aFp9EvC5wx/UKb2ty15Mu3sFuBs6esMzVmw87uOyVA/:w0/Lp9qWwWZMX3vs1VmwPA/
Static task
static1
Behavioral task
behavioral1
Sample
PRL#L0054960.exe
Resource
win7-20241010-en
Malware Config
Extracted
lokibot
http://touxzw.ir/scc1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
PRL#L0054960.exe
-
Size
973KB
-
MD5
0a4d861e14943c5d0485e20e36201cf0
-
SHA1
6ad026e902fc98586e09f878767bde9e163ebe85
-
SHA256
b6189207b080f2f35f61f5e572e9cb5592880d0fdb7943e6d67cabc96c84e905
-
SHA512
0f556375d708020046572c6fae4c7105a87aa6c1557b6b80fe64d0d3443bfcd77b5257c3edfbf1cf377e9f7bcea0d8b152d38a219ea75b88e873589427ef9316
-
SSDEEP
24576:RAHnh+eWsN3skA4RV1Hom2KXMmHarbpRtmw6J5:oh+ZkldoPK8Yarbpf6
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-