General
-
Target
Ordinediacquisto_PO201540_BlumelSrl.exe
-
Size
207KB
-
Sample
250220-mpm6xavmw6
-
MD5
3dcf8697acb4f94225fdd3ba64823668
-
SHA1
305b7b24871666a3050ea119727713566a7fc5c7
-
SHA256
62ad3f54c6adf2f358213da7c9729890d86d1f17444f23d159aa6455188b34bc
-
SHA512
4e2944f27b9caafdae1a83bd65c48c7e83786914f411a8fc46d5e2690c11118f8df2b4fcc29970d04142470361677ced924b9715df26023a4f39d9a80f64733c
-
SSDEEP
3072:XwXa4wpkbbAZLCqHFrzBiaR0ev6TjNdW1vkmhSicUJhb2Ym+XJS7XWAkPT1rFV64:X/BpkkLC4FrzMmzmmH2f+X
Static task
static1
Behavioral task
behavioral1
Sample
Ordinediacquisto_PO201540_BlumelSrl.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
https://ddrtot.shop/New/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Ordinediacquisto_PO201540_BlumelSrl.exe
-
Size
207KB
-
MD5
3dcf8697acb4f94225fdd3ba64823668
-
SHA1
305b7b24871666a3050ea119727713566a7fc5c7
-
SHA256
62ad3f54c6adf2f358213da7c9729890d86d1f17444f23d159aa6455188b34bc
-
SHA512
4e2944f27b9caafdae1a83bd65c48c7e83786914f411a8fc46d5e2690c11118f8df2b4fcc29970d04142470361677ced924b9715df26023a4f39d9a80f64733c
-
SSDEEP
3072:XwXa4wpkbbAZLCqHFrzBiaR0ev6TjNdW1vkmhSicUJhb2Ym+XJS7XWAkPT1rFV64:X/BpkkLC4FrzMmzmmH2f+X
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-