General
-
Target
4508bb625c6944b5d749fc10d9abef3ecdbeef7a58c6607b07597311d8f48cb1
-
Size
198KB
-
Sample
220707-vx2chacegk
-
MD5
3eab5d298c5423ff30cef60036c43472
-
SHA1
4fd1130b9c5fd2d11e5aa8f2d600fed73b59e636
-
SHA256
4508bb625c6944b5d749fc10d9abef3ecdbeef7a58c6607b07597311d8f48cb1
-
SHA512
497895b549a67d7a10e6c59f71cc42fb11a026184e676cd9af7328a4e0165662ac6c923e37cc693a6a5f4326836e4f96aba5c81d68348eff4bf97e964ccdd43e
Static task
static1
Behavioral task
behavioral1
Sample
4508bb625c6944b5d749fc10d9abef3ecdbeef7a58c6607b07597311d8f48cb1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4508bb625c6944b5d749fc10d9abef3ecdbeef7a58c6607b07597311d8f48cb1.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
lokibot
http://leadingfreightgroup.com/doings/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
4508bb625c6944b5d749fc10d9abef3ecdbeef7a58c6607b07597311d8f48cb1
-
Size
198KB
-
MD5
3eab5d298c5423ff30cef60036c43472
-
SHA1
4fd1130b9c5fd2d11e5aa8f2d600fed73b59e636
-
SHA256
4508bb625c6944b5d749fc10d9abef3ecdbeef7a58c6607b07597311d8f48cb1
-
SHA512
497895b549a67d7a10e6c59f71cc42fb11a026184e676cd9af7328a4e0165662ac6c923e37cc693a6a5f4326836e4f96aba5c81d68348eff4bf97e964ccdd43e
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-