General
-
Target
84378912213bcf0d13d8a60344b1c0452b0f25be6a267bf594f620760c6c0915
-
Size
1.4MB
-
Sample
221125-k2nl4afb77
-
MD5
11581e56cfd606532847fea32f75b1cc
-
SHA1
ec4ea02f0919431a1917f752b6c189731eabcbb7
-
SHA256
84378912213bcf0d13d8a60344b1c0452b0f25be6a267bf594f620760c6c0915
-
SHA512
23f2b550697c31575aa43dd88ea4533f7daccf06daba33d12ecb04c3b588a6ebaba61fbe564906b98daf5a2c9d60c77e8d321d6470c53867a0d44e2dd69d4e4d
-
SSDEEP
12288:iYY9egseAKtheRIY5Set8P6Bdv+DV0kEZMnGEg1QIesyd5+Q2Q1dx9IeLDrfRAaQ:FeL/r26mcuy
Static task
static1
Behavioral task
behavioral1
Sample
84378912213bcf0d13d8a60344b1c0452b0f25be6a267bf594f620760c6c0915.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
84378912213bcf0d13d8a60344b1c0452b0f25be6a267bf594f620760c6c0915.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
lokibot
http://becharnise.ir/fa5/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
84378912213bcf0d13d8a60344b1c0452b0f25be6a267bf594f620760c6c0915
-
Size
1.4MB
-
MD5
11581e56cfd606532847fea32f75b1cc
-
SHA1
ec4ea02f0919431a1917f752b6c189731eabcbb7
-
SHA256
84378912213bcf0d13d8a60344b1c0452b0f25be6a267bf594f620760c6c0915
-
SHA512
23f2b550697c31575aa43dd88ea4533f7daccf06daba33d12ecb04c3b588a6ebaba61fbe564906b98daf5a2c9d60c77e8d321d6470c53867a0d44e2dd69d4e4d
-
SSDEEP
12288:iYY9egseAKtheRIY5Set8P6Bdv+DV0kEZMnGEg1QIesyd5+Q2Q1dx9IeLDrfRAaQ:FeL/r26mcuy
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-