General
-
Target
c199b37d388d854ff6031105ffd57958083cdb123b1386dc63e4d6bb21566e52.exe
-
Size
1.5MB
-
Sample
250327-f4mqcszmx3
-
MD5
22cf9f5563030db472874f3bebc28947
-
SHA1
4f9020bd93da524a31657bf1bcfac7c86d6aa68e
-
SHA256
c199b37d388d854ff6031105ffd57958083cdb123b1386dc63e4d6bb21566e52
-
SHA512
72d69d78bd351c04dafb8ba0629131edd14d35bf6e460c1e2de3f343a9ccdd90218ec7c90bbe27feff4a9ea57e6a8054bb006958d6e5e7a697e16a21a8287cdc
-
SSDEEP
49152:sRCTPz99vLJM4iEngkRCip4VljKnJxUEifndEHqAC1zI/2cCiMh:sRCDHXt3AiYjKPUEqnde9sk/2nim
Behavioral task
behavioral1
Sample
c199b37d388d854ff6031105ffd57958083cdb123b1386dc63e4d6bb21566e52.exe
Resource
win7-20241010-en
Malware Config
Extracted
lokibot
http://beesco.net/second/chief3/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
c199b37d388d854ff6031105ffd57958083cdb123b1386dc63e4d6bb21566e52.exe
-
Size
1.5MB
-
MD5
22cf9f5563030db472874f3bebc28947
-
SHA1
4f9020bd93da524a31657bf1bcfac7c86d6aa68e
-
SHA256
c199b37d388d854ff6031105ffd57958083cdb123b1386dc63e4d6bb21566e52
-
SHA512
72d69d78bd351c04dafb8ba0629131edd14d35bf6e460c1e2de3f343a9ccdd90218ec7c90bbe27feff4a9ea57e6a8054bb006958d6e5e7a697e16a21a8287cdc
-
SSDEEP
49152:sRCTPz99vLJM4iEngkRCip4VljKnJxUEifndEHqAC1zI/2cCiMh:sRCDHXt3AiYjKPUEqnde9sk/2nim
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-