General
-
Target
b2e09b439d7b6af1c30f4d626d29ad458476bb12739164f2650752445ce0e210.zip
-
Size
1.2MB
-
Sample
231119-zh62nacc2w
-
MD5
eed80ca789b342a1c644298660fc91c0
-
SHA1
b55de069c33fc05611bf62ad92cc08689e8cb4fc
-
SHA256
0f0b4d2dc4229e967b490e60929f3a55dfb874fbfb7aec855971a99e478ccfa0
-
SHA512
15ac7202cd6c56b378a7f86f32df1dd5f446225ff8e4c66b3c8a3ecec51415d7790dcc2c4fc9c916df2f9aa9c7ff420b0227a40f15af42982245a30e21b01d12
-
SSDEEP
24576:xX973YFE9u83oP9jlTDljVMwQE+1RuvSFtJaJq+zAjl:fdwIolxHMwQEEumTaJD+
Static task
static1
Behavioral task
behavioral1
Sample
b2e09b439d7b6af1c30f4d626d29ad458476bb12739164f2650752445ce0e210.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
b2e09b439d7b6af1c30f4d626d29ad458476bb12739164f2650752445ce0e210.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
lokibot
https://sempersim.su/a21/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
b2e09b439d7b6af1c30f4d626d29ad458476bb12739164f2650752445ce0e210.exe
-
Size
2.2MB
-
MD5
3394aa9dfb48e470547e7f8628375edc
-
SHA1
61a0e1e57a660aebdb36db1a27af1455370d6510
-
SHA256
b2e09b439d7b6af1c30f4d626d29ad458476bb12739164f2650752445ce0e210
-
SHA512
6faf184af17608b71fd5bc5a4a0d50b3649d53647acea4aee52a18696fdc77aa8c85bed55281e27dbb395eefcf2db7a92b5be5b7389f69d9d517c11338a62fcc
-
SSDEEP
49152:ZqCY2nf4AUBeTNQqw/H2a2fidVEtMoo9SSwMKJrEmzuZWj7T:Exqf1pdw/bD8OkXcE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1