General
-
Target
1b64551d984bdaffeabf6a04fece8c92784ebe08f64254dac9630a4b754c22b8.exe
-
Size
6KB
-
Sample
221018-e1c63sefgq
-
MD5
e50afa71c3a883dfb7ace4f22f4b6e96
-
SHA1
6b076f4da5557502c87f248db804d456ee7a686f
-
SHA256
1b64551d984bdaffeabf6a04fece8c92784ebe08f64254dac9630a4b754c22b8
-
SHA512
f20bf1418519c9076c7bd5ff83814e5ceb75f7bd2a72769de427458990be9f06b254249a3b3319e1e7816b052eaa44a340bee8e38febad2d7a96ac3d1a83e1ab
-
SSDEEP
96:Jr3ozMTIj78gVY40N9R02aBhkuifY5KW1YdaKNDc6NyWejFnU:d36rY/9i2whkuCY1ANLB
Static task
static1
Behavioral task
behavioral1
Sample
1b64551d984bdaffeabf6a04fece8c92784ebe08f64254dac9630a4b754c22b8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1b64551d984bdaffeabf6a04fece8c92784ebe08f64254dac9630a4b754c22b8.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
http://192.64.118.167/profile.php?id=6iMMKJHCU15sObupIn6Ll6LlnrEG0OS67FTRoBujDALrMfRvD
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
1b64551d984bdaffeabf6a04fece8c92784ebe08f64254dac9630a4b754c22b8.exe
-
Size
6KB
-
MD5
e50afa71c3a883dfb7ace4f22f4b6e96
-
SHA1
6b076f4da5557502c87f248db804d456ee7a686f
-
SHA256
1b64551d984bdaffeabf6a04fece8c92784ebe08f64254dac9630a4b754c22b8
-
SHA512
f20bf1418519c9076c7bd5ff83814e5ceb75f7bd2a72769de427458990be9f06b254249a3b3319e1e7816b052eaa44a340bee8e38febad2d7a96ac3d1a83e1ab
-
SSDEEP
96:Jr3ozMTIj78gVY40N9R02aBhkuifY5KW1YdaKNDc6NyWejFnU:d36rY/9i2whkuCY1ANLB
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-