General
-
Target
SecuriteInfo.com.Trojan.TR.Dropper.Gen7.15257.12089.exe
-
Size
103KB
-
Sample
221125-g8wz9sgc44
-
MD5
383fa5d38032aeff8ca53f89f16ffe9d
-
SHA1
2d08908de431103445056c8b0cc412d81a5194a0
-
SHA256
913e9eae06e62e12e0185be2ca5745e6e9c943c990607e1a07941ea4dbf12e46
-
SHA512
95e4377efed9a8bccde026bbecbbed8ba4a78edd7bb840cda9418ae61802e439507d4306ef176421bac4f98638ea99faa1ce047f28fb9d33675bedc39fba9e85
-
SSDEEP
768:3PmujM2f2Tfq8sKU/Pv8Oy0df2GLLPWdNduyo7p5:3Pmx2f2Ty823QeLWdNduykz
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.TR.Dropper.Gen7.15257.12089.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.TR.Dropper.Gen7.15257.12089.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
https://segoremlolgv.cf/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
SecuriteInfo.com.Trojan.TR.Dropper.Gen7.15257.12089.exe
-
Size
103KB
-
MD5
383fa5d38032aeff8ca53f89f16ffe9d
-
SHA1
2d08908de431103445056c8b0cc412d81a5194a0
-
SHA256
913e9eae06e62e12e0185be2ca5745e6e9c943c990607e1a07941ea4dbf12e46
-
SHA512
95e4377efed9a8bccde026bbecbbed8ba4a78edd7bb840cda9418ae61802e439507d4306ef176421bac4f98638ea99faa1ce047f28fb9d33675bedc39fba9e85
-
SSDEEP
768:3PmujM2f2Tfq8sKU/Pv8Oy0df2GLLPWdNduyo7p5:3Pmx2f2Ty823QeLWdNduykz
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-