General
-
Target
.
-
Size
146KB
-
Sample
240408-vp68saef32
-
MD5
199f2cb418b3bbb67af234b8499c2577
-
SHA1
8e1d482fc76fe9cfd5f3bc03020ddd234b6403b0
-
SHA256
801f39a832a874089683a32d34b75d834147658644608cf3fa899f350dad026e
-
SHA512
996481a21ac91d3c005dfd56074cb67455362586b57a2dbc60d71dbea76a0a75a864e7ca583c9f06b45ac3f27b3f1018284c7577408bf183cff333c5cbeeac7e
-
SSDEEP
1536:oWkud8LFVMUK4DgnVR4DBllKoVkL30vD9329s4DvHhqiS:pkPLFoVsllXmxBHhqiS
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win11-20240221-en
Malware Config
Extracted
lokibot
http://blesblochem.com/two/gates1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
.
-
Size
146KB
-
MD5
199f2cb418b3bbb67af234b8499c2577
-
SHA1
8e1d482fc76fe9cfd5f3bc03020ddd234b6403b0
-
SHA256
801f39a832a874089683a32d34b75d834147658644608cf3fa899f350dad026e
-
SHA512
996481a21ac91d3c005dfd56074cb67455362586b57a2dbc60d71dbea76a0a75a864e7ca583c9f06b45ac3f27b3f1018284c7577408bf183cff333c5cbeeac7e
-
SSDEEP
1536:oWkud8LFVMUK4DgnVR4DBllKoVkL30vD9329s4DvHhqiS:pkPLFoVsllXmxBHhqiS
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Renames multiple (650) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Office macro that triggers on suspicious action
Office document macro which triggers in special circumstances - often malicious.
-
Stops running service(s)
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Registers COM server for autorun
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
1Indicator Removal
2File Deletion
2Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1