General
-
Target
a5350ff592171ebe67d95e86b557751d67d1f47fe87889b0ffbd0509db14813c.exe
-
Size
1.1MB
-
Sample
250318-hrqycszly9
-
MD5
d5cf93a33671da1bc59838ec0e0cc3a0
-
SHA1
11ac6fdd8813552b00150c7611755fd04b6456c3
-
SHA256
a5350ff592171ebe67d95e86b557751d67d1f47fe87889b0ffbd0509db14813c
-
SHA512
162b1d5a9557f0c064dc33fbb3c769ce9a44d873d2e6a68d55474ce908a3eca7fc4e276207dec72c986d9cf0c214876172f28fdec261bf5b17ae621be37e27d0
-
SSDEEP
24576:oqDEvCTbMWu7rQYlBQcBiT6rprG8aLF/IcUuJ94fdFc:oTvC/MTQYxsWR7aLFRUuiF
Static task
static1
Behavioral task
behavioral1
Sample
a5350ff592171ebe67d95e86b557751d67d1f47fe87889b0ffbd0509db14813c.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://sempersim.su/c3/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
a5350ff592171ebe67d95e86b557751d67d1f47fe87889b0ffbd0509db14813c.exe
-
Size
1.1MB
-
MD5
d5cf93a33671da1bc59838ec0e0cc3a0
-
SHA1
11ac6fdd8813552b00150c7611755fd04b6456c3
-
SHA256
a5350ff592171ebe67d95e86b557751d67d1f47fe87889b0ffbd0509db14813c
-
SHA512
162b1d5a9557f0c064dc33fbb3c769ce9a44d873d2e6a68d55474ce908a3eca7fc4e276207dec72c986d9cf0c214876172f28fdec261bf5b17ae621be37e27d0
-
SSDEEP
24576:oqDEvCTbMWu7rQYlBQcBiT6rprG8aLF/IcUuJ94fdFc:oTvC/MTQYxsWR7aLFRUuiF
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-