General
-
Target
c56bb5dd4d8d43ad42b5a0be7a945467cbd49e410c806750f4ca8a535e91daa4
-
Size
556KB
-
Sample
250219-gpddtaypcx
-
MD5
ba5de0eb79bc76772de30de27e768d65
-
SHA1
3741fe1e701424bedcd0505e179a648654627015
-
SHA256
c56bb5dd4d8d43ad42b5a0be7a945467cbd49e410c806750f4ca8a535e91daa4
-
SHA512
85aa604c0331978b210ce49e4f62eaed3b5d187bdf84192d8fd35e25f5b86ae102dcd231c51807463bd46f840b99f034675346ff85402e398a7f6c0cc87f393e
-
SSDEEP
12288:7J34Bshuq6ORTtD8WabY2t4o7IDzrPOp0ez/UvUyjUCRyNwEQaS:d34BszTUfyj2NLyUzCY+b
Static task
static1
Behavioral task
behavioral1
Sample
Payment Advice-00100299-PDF.exe
Resource
win7-20241010-en
Malware Config
Extracted
lokibot
http://touxzw.ir/tking3/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Payment Advice-00100299-PDF.exe
-
Size
980KB
-
MD5
533e9a82e11e4d2d1cc7859baa9bd565
-
SHA1
7040dfb325e5177adf012e1519f5cb3c7ea761e1
-
SHA256
9baa9eae4ac972c6ec77daa29929d86ea2462c9b2a8e4934b35cfab2a331de49
-
SHA512
2d4dba2ab4f4a2d59e73f035c2ff57716f286bd0d2090fa7920b458ad3c9455dfad55e0ac49b947f5ac4d43c5e0f917d7802297f8be5d59346242ec880bc1fd1
-
SSDEEP
24576:fAHnh+eWsN3skA4RV1Hom2KXMmHad/+rkh5:Ch+ZkldoPK8Yad/+S
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-