General
-
Target
3e67075e2feae17f7b15640bafd93d8f129d288665065c46351341e50febfda7
-
Size
574KB
-
Sample
220701-jdfe5saagp
-
MD5
a9952b4391aaf6a1e11c325f1410cc79
-
SHA1
0a83f8fc195c65e249a079c98e004b4898cc83e0
-
SHA256
3e67075e2feae17f7b15640bafd93d8f129d288665065c46351341e50febfda7
-
SHA512
c57989a0d5d615ab6cc4834df586afbc1f6a6ede8ad4229fe6654ce2a2154fea2e6941df12e4d67767a9c72556002f0e4e84739c3bd91130d90356cefc21c81a
Static task
static1
Behavioral task
behavioral1
Sample
3e67075e2feae17f7b15640bafd93d8f129d288665065c46351341e50febfda7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3e67075e2feae17f7b15640bafd93d8f129d288665065c46351341e50febfda7.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
lokibot
http://kcc-sip.com/work/terri/nel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
3e67075e2feae17f7b15640bafd93d8f129d288665065c46351341e50febfda7
-
Size
574KB
-
MD5
a9952b4391aaf6a1e11c325f1410cc79
-
SHA1
0a83f8fc195c65e249a079c98e004b4898cc83e0
-
SHA256
3e67075e2feae17f7b15640bafd93d8f129d288665065c46351341e50febfda7
-
SHA512
c57989a0d5d615ab6cc4834df586afbc1f6a6ede8ad4229fe6654ce2a2154fea2e6941df12e4d67767a9c72556002f0e4e84739c3bd91130d90356cefc21c81a
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-