General
-
Target
ef04082c069f32ce5fa922430ad8b921b6433da86ba528a23b10b95817f40b3a.zip
-
Size
699KB
-
Sample
231119-2bd4eacc37
-
MD5
95a284657c5fb957fd5d734b94503753
-
SHA1
caca762dc406361b5ec06062c62119b5709c5096
-
SHA256
3dcfd1289b2da8ad0f82738821b35fd065281cf225124df3a64d3103e723fab7
-
SHA512
d0b24869283a782cc1fb10394c446359f88132377df6b9e3954a469801900f551d2177c0d0927f50f95049c4ee64c0236282667d75d9f404b96c8ca8d731f25a
-
SSDEEP
12288:zKyA22Q/FjOjhTy+MnoJrNoTHh8QRFlpPK3NFzleVl8tkOB+Dd4Gf24U:Wp2tNjITdlEyQLS3NF5eVl2XBKSGf2N
Static task
static1
Behavioral task
behavioral1
Sample
ef04082c069f32ce5fa922430ad8b921b6433da86ba528a23b10b95817f40b3a.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
ef04082c069f32ce5fa922430ad8b921b6433da86ba528a23b10b95817f40b3a.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
lokibot
https://miners-gold.com/deddd/lokinew/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
ef04082c069f32ce5fa922430ad8b921b6433da86ba528a23b10b95817f40b3a.exe
-
Size
796KB
-
MD5
0abd28c923a124abeeade43e31aace8c
-
SHA1
05fbfd47996af96e33019ca766c3b32550391df0
-
SHA256
ef04082c069f32ce5fa922430ad8b921b6433da86ba528a23b10b95817f40b3a
-
SHA512
86908f5622e8b5245c314e22d8c54b2857cd523e7062d89c7008fd2bfa8e504be986ecf761a2382df4d02ed9bb9f4085319f853a30b10fa6534c0da930237bd3
-
SSDEEP
12288:6i6b8YQv+yg7KSBWEhyi6EGq0wQEWiTJI8oeXnwdoTvbMHwFd9Q0EKExEJ:Ob0mygOS0EhyyGYJbX4+QQFEcJ
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-