General
-
Target
b9c564593b02d8869ea47e5b1b3cad2879bb49f1df790fe24350486037d9ef44.z
-
Size
454KB
-
Sample
250221-eplzvaslhz
-
MD5
d58eb3d81d5fc60e54fbfc394f59684b
-
SHA1
6709a3ae577a7d69af6a63392c865f539e26e71a
-
SHA256
b9c564593b02d8869ea47e5b1b3cad2879bb49f1df790fe24350486037d9ef44
-
SHA512
32b6cfe35b0b585c76ae93066dfdf2bbab8f36e10e08e8369429309b155fcf7ca4cd396e1e129a03db139b19a7e72642b66c615cc9373974c30ca7c19b02e1e9
-
SSDEEP
12288:3TWL7UmIIEV0U7yUauHsMUXWiSWJ3hryhYG9lqVCe4/gi2u6RrW++Cgw7z:3CnZra08yUauHsMUGEJ3hmhxo+CWrE
Static task
static1
Behavioral task
behavioral1
Sample
Remittance_CT022024.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://touxzw.ir/fix/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Remittance_CT022024.exe
-
Size
938KB
-
MD5
6ba300b78a4f898b931cb4889ce9c461
-
SHA1
198207a44362b3e7cd1065973c0047619753ac99
-
SHA256
0db0c831bf2a05700a58dbef8e3ef35af21b6a6dd4de42fa68dfbc608aaf2d5a
-
SHA512
946a890c7bd74ca4e70f9e51fafd2308ce722d33516c0b1350d8edcbabda66e00e2a9f44175578f570df94531945e8041e95c5e8338ef2a5fcd9397eb56b2581
-
SSDEEP
24576:Hu6J33O0c+JY5UZ+XC0kGso6Fa6jdol/kIX6lYtWY:Bu0c++OCvkGs9Fa6jdg/kntY
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-