General
-
Target
tmpunrdc4e2
-
Size
973KB
-
Sample
250220-p1q32svqdn
-
MD5
0a4d861e14943c5d0485e20e36201cf0
-
SHA1
6ad026e902fc98586e09f878767bde9e163ebe85
-
SHA256
b6189207b080f2f35f61f5e572e9cb5592880d0fdb7943e6d67cabc96c84e905
-
SHA512
0f556375d708020046572c6fae4c7105a87aa6c1557b6b80fe64d0d3443bfcd77b5257c3edfbf1cf377e9f7bcea0d8b152d38a219ea75b88e873589427ef9316
-
SSDEEP
24576:RAHnh+eWsN3skA4RV1Hom2KXMmHarbpRtmw6J5:oh+ZkldoPK8Yarbpf6
Static task
static1
Behavioral task
behavioral1
Sample
tmpunrdc4e2.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://touxzw.ir/scc1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
tmpunrdc4e2
-
Size
973KB
-
MD5
0a4d861e14943c5d0485e20e36201cf0
-
SHA1
6ad026e902fc98586e09f878767bde9e163ebe85
-
SHA256
b6189207b080f2f35f61f5e572e9cb5592880d0fdb7943e6d67cabc96c84e905
-
SHA512
0f556375d708020046572c6fae4c7105a87aa6c1557b6b80fe64d0d3443bfcd77b5257c3edfbf1cf377e9f7bcea0d8b152d38a219ea75b88e873589427ef9316
-
SSDEEP
24576:RAHnh+eWsN3skA4RV1Hom2KXMmHarbpRtmw6J5:oh+ZkldoPK8Yarbpf6
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-