General
-
Target
4ab469b6b0133d376558207795a41810fa98498724a9edc6e18c0f3b1d112d6b.iso
-
Size
268KB
-
Sample
250221-c6bt4a1mfr
-
MD5
5b543a9631cb239c8cfe55b4ffeda83b
-
SHA1
e46fa3c4ae970cdbc05bfadfd4910ee2f3c61513
-
SHA256
4ab469b6b0133d376558207795a41810fa98498724a9edc6e18c0f3b1d112d6b
-
SHA512
f68046399fbb37a052654077e5b41fce19361ed55cd543e9f5f58ca74368e39d530e662766ae5ace59763a54e7841732a441ce8490d1781a2ad68366ca1c71b6
-
SSDEEP
3072:YwXa4wpkbbAZLCqHFrzBiaR0ev6TjNdW1vkmhSicUJhb2Ym+XJS7XWAkPT1rFV64:Y/BpkkLC4FrzMmzmmH2f+X
Static task
static1
Behavioral task
behavioral1
Sample
Ordine di acquisto_(PO201540)_Blumel Srl.exe
Resource
win7-20241010-en
Malware Config
Extracted
lokibot
https://ddrtot.shop/New/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Ordine di acquisto_(PO201540)_Blumel Srl.exe
-
Size
207KB
-
MD5
3dcf8697acb4f94225fdd3ba64823668
-
SHA1
305b7b24871666a3050ea119727713566a7fc5c7
-
SHA256
62ad3f54c6adf2f358213da7c9729890d86d1f17444f23d159aa6455188b34bc
-
SHA512
4e2944f27b9caafdae1a83bd65c48c7e83786914f411a8fc46d5e2690c11118f8df2b4fcc29970d04142470361677ced924b9715df26023a4f39d9a80f64733c
-
SSDEEP
3072:XwXa4wpkbbAZLCqHFrzBiaR0ev6TjNdW1vkmhSicUJhb2Ym+XJS7XWAkPT1rFV64:X/BpkkLC4FrzMmzmmH2f+X
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-