General
-
Target
cb5a734b40ca605caf417cf725a73d7e.exe
-
Size
213KB
-
Sample
221001-l17t1sgghp
-
MD5
cb5a734b40ca605caf417cf725a73d7e
-
SHA1
1f64186091fba7390338001ed37a8bd7b4778f08
-
SHA256
ab7f2cace5639d856b4f95f3b96776b2f62de75b7d4c48fabcfccf63b90a2cbd
-
SHA512
e5af26105a62cbb761621547376fc96143bf6d6762dff805e62b8c30c7ee1e01d55177c3ca42592d92a058dc89e0e56f58061d29f42757026bb05434363719fe
-
SSDEEP
3072:WwJ52Y7ZoH5XJaVFJwayPiMuPmfmqflNd7oF3/BSlPLL4sO9Jpgj+UzkpnujbP4i:WwHysLJwrbBvlNCwPLL1O9GkpuntZ3
Static task
static1
Behavioral task
behavioral1
Sample
cb5a734b40ca605caf417cf725a73d7e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cb5a734b40ca605caf417cf725a73d7e.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
http://ipvhosted.duckdns.org:6060/hosted/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
cb5a734b40ca605caf417cf725a73d7e.exe
-
Size
213KB
-
MD5
cb5a734b40ca605caf417cf725a73d7e
-
SHA1
1f64186091fba7390338001ed37a8bd7b4778f08
-
SHA256
ab7f2cace5639d856b4f95f3b96776b2f62de75b7d4c48fabcfccf63b90a2cbd
-
SHA512
e5af26105a62cbb761621547376fc96143bf6d6762dff805e62b8c30c7ee1e01d55177c3ca42592d92a058dc89e0e56f58061d29f42757026bb05434363719fe
-
SSDEEP
3072:WwJ52Y7ZoH5XJaVFJwayPiMuPmfmqflNd7oF3/BSlPLL4sO9Jpgj+UzkpnujbP4i:WwHysLJwrbBvlNCwPLL1O9GkpuntZ3
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-