General
-
Target
ab7f2cace5639d856b4f95f3b96776b2f62de75b7d4c48fabcfccf63b90a2cbd.zip
-
Size
191KB
-
Sample
221001-l84gkafgg5
-
MD5
16ba38408ee006f7792d942df357e588
-
SHA1
9c7e7be6b1f16b81a4dc66c636e684ad512dc459
-
SHA256
a07c65637bff22e30c394682fdadacbdfc252d8a48abf2ac69f7e5d21cec6c40
-
SHA512
70be93645d00970d569a541bac70ce73162e152046d0b2b828ff812f27aa324734f84bf38c519275fdb6eb8e222a5afebbc28501ae256decf08d4771d3a54718
-
SSDEEP
3072:hIJxihmGHkctGU23LlCTUHbRRXdYdhg+nYyYMKUYa+lfSPuW54YIcGp6MR20BvA3:hswdlGU25C+bPKdhgyYyVKUYTlfS1D1R
Static task
static1
Behavioral task
behavioral1
Sample
ab7f2cace5639d856b4f95f3b96776b2f62de75b7d4c48fabcfccf63b90a2cbd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab7f2cace5639d856b4f95f3b96776b2f62de75b7d4c48fabcfccf63b90a2cbd.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
http://ipvhosted.duckdns.org:6060/hosted/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
ab7f2cace5639d856b4f95f3b96776b2f62de75b7d4c48fabcfccf63b90a2cbd.exe
-
Size
213KB
-
MD5
cb5a734b40ca605caf417cf725a73d7e
-
SHA1
1f64186091fba7390338001ed37a8bd7b4778f08
-
SHA256
ab7f2cace5639d856b4f95f3b96776b2f62de75b7d4c48fabcfccf63b90a2cbd
-
SHA512
e5af26105a62cbb761621547376fc96143bf6d6762dff805e62b8c30c7ee1e01d55177c3ca42592d92a058dc89e0e56f58061d29f42757026bb05434363719fe
-
SSDEEP
3072:WwJ52Y7ZoH5XJaVFJwayPiMuPmfmqflNd7oF3/BSlPLL4sO9Jpgj+UzkpnujbP4i:WwHysLJwrbBvlNCwPLL1O9GkpuntZ3
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-