General
-
Target
597495dd0d1b7eb2215a9627a337c1a1f7031fee38c7d6e6863b87d24f194814
-
Size
1.3MB
-
Sample
220707-npb93sfcgn
-
MD5
c8676a515bba78010744899b6df2c877
-
SHA1
49b73523343f90b946176ce897318eb6636547ad
-
SHA256
597495dd0d1b7eb2215a9627a337c1a1f7031fee38c7d6e6863b87d24f194814
-
SHA512
0977dc43c8f09738672470ef9a7113607184df854fb802a67911fd6ce450bfc8eb0b95c991c812c91fa74d7ef93965c6c84fb6468b34044dee0946db7bbcbe02
Static task
static1
Behavioral task
behavioral1
Sample
597495dd0d1b7eb2215a9627a337c1a1f7031fee38c7d6e6863b87d24f194814.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
597495dd0d1b7eb2215a9627a337c1a1f7031fee38c7d6e6863b87d24f194814.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
lokibot
https://clotiahs.info/kobi/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
597495dd0d1b7eb2215a9627a337c1a1f7031fee38c7d6e6863b87d24f194814
-
Size
1.3MB
-
MD5
c8676a515bba78010744899b6df2c877
-
SHA1
49b73523343f90b946176ce897318eb6636547ad
-
SHA256
597495dd0d1b7eb2215a9627a337c1a1f7031fee38c7d6e6863b87d24f194814
-
SHA512
0977dc43c8f09738672470ef9a7113607184df854fb802a67911fd6ce450bfc8eb0b95c991c812c91fa74d7ef93965c6c84fb6468b34044dee0946db7bbcbe02
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-