General
-
Target
d56c167b2fd22d92d19be0695ef07b07275f31a7c62a5066f92539b758ab0290.exe
-
Size
972KB
-
Sample
210114-5bt1ayfczn
-
MD5
f5267e97f7ae9f34fd6dfe4d9f53752a
-
SHA1
dd19d67103a20da8304576f7514c48f3fb1499d3
-
SHA256
d56c167b2fd22d92d19be0695ef07b07275f31a7c62a5066f92539b758ab0290
-
SHA512
ff2fd50c7f667238e2dd976424673195862494030d2f0e927f2f822d6620b5c30a0b03244d22f689b96f65708212b97306b2e127d7c6dece87760f52f88d0719
Static task
static1
Behavioral task
behavioral1
Sample
d56c167b2fd22d92d19be0695ef07b07275f31a7c62a5066f92539b758ab0290.exe
Resource
win7v20201028
Malware Config
Extracted
lokibot
http://paciflxinc.com/zoro/zoro1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d56c167b2fd22d92d19be0695ef07b07275f31a7c62a5066f92539b758ab0290.exe
-
Size
972KB
-
MD5
f5267e97f7ae9f34fd6dfe4d9f53752a
-
SHA1
dd19d67103a20da8304576f7514c48f3fb1499d3
-
SHA256
d56c167b2fd22d92d19be0695ef07b07275f31a7c62a5066f92539b758ab0290
-
SHA512
ff2fd50c7f667238e2dd976424673195862494030d2f0e927f2f822d6620b5c30a0b03244d22f689b96f65708212b97306b2e127d7c6dece87760f52f88d0719
-
Suspicious use of SetThreadContext
-