General
-
Target
d81b40d87d7caee2e52fa109131ce7702810c9fb0f98f8a15fdd72f14146e513
-
Size
740KB
-
Sample
220625-f6dkgafghp
-
MD5
a305fe5a1a2d98b54d9acfb97f2d2525
-
SHA1
a9a03774732c584faef112beec2605d333b4181c
-
SHA256
d81b40d87d7caee2e52fa109131ce7702810c9fb0f98f8a15fdd72f14146e513
-
SHA512
8aeb61df7da99da3854c534c07c348f0d89cd1174722f8ad3a72d6606bb9cfb420afa3465f42a5a8fdad20b1a226ee157717c047607321d887bd2406f3ccb71d
Static task
static1
Behavioral task
behavioral1
Sample
d81b40d87d7caee2e52fa109131ce7702810c9fb0f98f8a15fdd72f14146e513.exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
http://citiline.org.ng/XXD123-TY/TULIP8890890-56788/Panel/five/fre,php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d81b40d87d7caee2e52fa109131ce7702810c9fb0f98f8a15fdd72f14146e513
-
Size
740KB
-
MD5
a305fe5a1a2d98b54d9acfb97f2d2525
-
SHA1
a9a03774732c584faef112beec2605d333b4181c
-
SHA256
d81b40d87d7caee2e52fa109131ce7702810c9fb0f98f8a15fdd72f14146e513
-
SHA512
8aeb61df7da99da3854c534c07c348f0d89cd1174722f8ad3a72d6606bb9cfb420afa3465f42a5a8fdad20b1a226ee157717c047607321d887bd2406f3ccb71d
-
Detect Neshta Payload
-
Modifies system executable filetype association
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-