General
-
Target
b04ac09198406e4e37731d9d66ced244.exe
-
Size
1.5MB
-
Sample
250324-g7bmyavmx5
-
MD5
b04ac09198406e4e37731d9d66ced244
-
SHA1
28769f8cf86088fb266069b8e66471e73f5a9f17
-
SHA256
ba07cd9c65b14ed73b58436fdbe6a6507d24d350c0f4ffe9feb85ed57bbca28c
-
SHA512
96ef656073e2d111ca10f57bb187cd3a8176e44c45776acc9456519d2cfa5ad95a081fca2ec22ffad8311312e3447f762b3da3fdc007aad9bc5feefc197c47d5
-
SSDEEP
49152:PRCTPz99vLJM4iEngkRCip4VljKnJxUEifndEHqAC1zI/2cCiMh:PRCDHXt3AiYjKPUEqnde9sk/2nim
Behavioral task
behavioral1
Sample
b04ac09198406e4e37731d9d66ced244.exe
Resource
win7-20241010-en
Malware Config
Extracted
lokibot
http://beesco.net/second/chief3/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
b04ac09198406e4e37731d9d66ced244.exe
-
Size
1.5MB
-
MD5
b04ac09198406e4e37731d9d66ced244
-
SHA1
28769f8cf86088fb266069b8e66471e73f5a9f17
-
SHA256
ba07cd9c65b14ed73b58436fdbe6a6507d24d350c0f4ffe9feb85ed57bbca28c
-
SHA512
96ef656073e2d111ca10f57bb187cd3a8176e44c45776acc9456519d2cfa5ad95a081fca2ec22ffad8311312e3447f762b3da3fdc007aad9bc5feefc197c47d5
-
SSDEEP
49152:PRCTPz99vLJM4iEngkRCip4VljKnJxUEifndEHqAC1zI/2cCiMh:PRCDHXt3AiYjKPUEqnde9sk/2nim
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-