General
-
Target
42adaf6d278e4270a6343d639da2847808a4d0effb52fc0a0d0ac2609eafe44f
-
Size
473KB
-
Sample
240417-qaj3gshh8y
-
MD5
4225092b69a2e384d935b05880dffdf6
-
SHA1
1ac24366ccd8c82a5af2e44977cf8296e14c6e54
-
SHA256
42adaf6d278e4270a6343d639da2847808a4d0effb52fc0a0d0ac2609eafe44f
-
SHA512
ad0e3f1c8432709d3c3cd8e714cf5c7c1ea785407f8930864e16b2907fd3bc8abbda403c3bdc6141404cb58dd266338a35ae75a2c6b9ad97527977a90186c90c
-
SSDEEP
12288:qH7GjnBH0LJaV6rezImprDa/FoDP/JkaUXLxigg:qHSgaV6c9p/OFoDP/SjMgg
Static task
static1
Behavioral task
behavioral1
Sample
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
lokibot
https://sempersim.su/c16/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe
-
Size
490KB
-
MD5
a8f86e43a86f3e0047342917a3b4d823
-
SHA1
90e606c3aa0f2e7e438ad0eb4e43a391adf7af6a
-
SHA256
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743
-
SHA512
794f30895e43498d59449f680f6298b09a947003ff7f09a33ed2241a16cf5bfcaf06968511bf95e2d4ecb2554a19ca936396e21128b0a32bc9e6ce636ce6c6d5
-
SSDEEP
12288:Yes3/5HnQc1x6qDCRSMXZrT12L1fRFen:zwBHN3FDF0TMRfR8
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-