General
-
Target
c3a97565b05fae2c36ecd398ab137389.bin
-
Size
21KB
-
Sample
230401-b9k2hafb85
-
MD5
39c2e22db616434fc6364161329fdd2b
-
SHA1
500b9de99b5b2caf954c8518d7ed82b25eb77b6c
-
SHA256
ee9c02fcc25ab83443307355ebc4216a9f3afc56a36e51616426b5d7bf758801
-
SHA512
422914776b4aa8f3961c05edc0cf9cd2248c24bdf4f5c201e785ed263dd0f9547957f86f999c0da5d03eff5f33fd0b71f56eabb47d6c9d6b4455280e8c741a36
-
SSDEEP
384:8rLoKkyluWAX5dKm2DrrG7u6tkVzXoWeVdED3QjOpn+HpfKWo:Yo8luhPKbrGDKzYWeV6D3iOD
Static task
static1
Behavioral task
behavioral1
Sample
b56a903dfdf14906fd90789b61fd94b7b6c657c436759d192cc32b5d77f8f2f9.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b56a903dfdf14906fd90789b61fd94b7b6c657c436759d192cc32b5d77f8f2f9.vbs
Resource
win10v2004-20230220-en
Malware Config
Extracted
lokibot
http://208.67.105.148/tallest/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
b56a903dfdf14906fd90789b61fd94b7b6c657c436759d192cc32b5d77f8f2f9.vbs
-
Size
339KB
-
MD5
c3a97565b05fae2c36ecd398ab137389
-
SHA1
91b0fcf7ed1552a4c3bf1b234646cf6d0186e9ee
-
SHA256
b56a903dfdf14906fd90789b61fd94b7b6c657c436759d192cc32b5d77f8f2f9
-
SHA512
e2bb624b3fe59e6dd83034931aabad0350c21c3167b9310a4cdaab268c7dbb1d1191220ad274e9baa241fccf71613c54d97004493387b0aa261eaf114778371d
-
SSDEEP
1536:j89r/aDcWJwG0mtvR/Eg5GKFV6UtbOc8GxqsMzcCq:KtZs
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-