General
-
Target
b2f5c7f17e78a48a2a0d31138e54995eb71e55410ef7207d570c344c258ef336.zip
-
Size
399KB
-
Sample
230208-ly9ktshf4w
-
MD5
f528e051ac2acb57ab5f4523b67d3104
-
SHA1
87fed9f03b5bb996fb515caec5989b75fad18564
-
SHA256
3d1882e6f4780e8d1efbe4e6f51e3e0aa03ced9136fcfca5a5f2b11d26469de1
-
SHA512
f71d27b1554de4d12f4236d17372ca720faab27777d64b2173904c829db7b8b0132e4d8894ea9b292f96e3a5b90213233f2ab77cc9c0779b7ad67061e939b2ed
-
SSDEEP
12288:2xVuEO851lRCtotreeY0ahun+IMSYKIobh:2xTn3o6adi+RzKI2h
Static task
static1
Behavioral task
behavioral1
Sample
b2f5c7f17e78a48a2a0d31138e54995eb71e55410ef7207d570c344c258ef336.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b2f5c7f17e78a48a2a0d31138e54995eb71e55410ef7207d570c344c258ef336.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
lokibot
http://hghfe.tk/Sameed/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
b2f5c7f17e78a48a2a0d31138e54995eb71e55410ef7207d570c344c258ef336.exe
-
Size
1.6MB
-
MD5
00c9e269db13568cc703bd4273787201
-
SHA1
162915bdefde5a9a317d5d68eb92f0be67cdf356
-
SHA256
b2f5c7f17e78a48a2a0d31138e54995eb71e55410ef7207d570c344c258ef336
-
SHA512
ca7d97c01bb31b312584ca856909f365bd529e517f72ec398051fea5b641a892d6303d482ca58cd7fe2e6c9847bbc964939fb187a434200dc74c98500a0cdb97
-
SSDEEP
12288:EmIbRtHUB7lceAvWDlwFnJCSVDKhEzkpgOim0TC+j2oHa5CiDWKGmGYqITrpmc:cy0Tv6osFqITrpH
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-