General
-
Target
45379843244b5168239ab555c30f898bc61eed5753fab08fe6e04d4ece3eed41
-
Size
481KB
-
Sample
220707-t23kpadbg2
-
MD5
3f9c33cb8f78d31b23d5013eb1a7fb2b
-
SHA1
55d6c089de471a641fe86023565bca1a79a12238
-
SHA256
45379843244b5168239ab555c30f898bc61eed5753fab08fe6e04d4ece3eed41
-
SHA512
29ca30565421647aaf5d94f250617f67baea0c80f46e59502c685714836918cf727e7ef79d1342f78d39054338fb3f5e16db64b098df86c8bb2b5c80c7956b39
Static task
static1
Behavioral task
behavioral1
Sample
45379843244b5168239ab555c30f898bc61eed5753fab08fe6e04d4ece3eed41.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
45379843244b5168239ab555c30f898bc61eed5753fab08fe6e04d4ece3eed41.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
lokibot
http://kings.jesseworld.eu/five/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
45379843244b5168239ab555c30f898bc61eed5753fab08fe6e04d4ece3eed41
-
Size
481KB
-
MD5
3f9c33cb8f78d31b23d5013eb1a7fb2b
-
SHA1
55d6c089de471a641fe86023565bca1a79a12238
-
SHA256
45379843244b5168239ab555c30f898bc61eed5753fab08fe6e04d4ece3eed41
-
SHA512
29ca30565421647aaf5d94f250617f67baea0c80f46e59502c685714836918cf727e7ef79d1342f78d39054338fb3f5e16db64b098df86c8bb2b5c80c7956b39
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-