General
-
Target
594bafd76c461932f100f8a586c77bbcfab182914062b92b4b24b6611e2d879b
-
Size
473KB
-
Sample
240417-qhm44sgh96
-
MD5
130b57e263c6a7da68743928f529484f
-
SHA1
2aa43395fedee6cf357da37acc0ff3cec954383c
-
SHA256
594bafd76c461932f100f8a586c77bbcfab182914062b92b4b24b6611e2d879b
-
SHA512
e36fff934db3496faeac99b507dac8ff81033ea98f2e9c83bdfdad9254b6aebbdb58d49385c3c0b749a8774ab1de3f19b25ae648942f2f206d171470016dfee0
-
SSDEEP
12288:Pz0+VCOUz5HWFzpveSpP6EbLGTxebu1y0sZS:Pz0OUztUzpWWSEbCTxea/sZS
Static task
static1
Behavioral task
behavioral1
Sample
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
lokibot
https://sempersim.su/c16/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe
-
Size
490KB
-
MD5
a8f86e43a86f3e0047342917a3b4d823
-
SHA1
90e606c3aa0f2e7e438ad0eb4e43a391adf7af6a
-
SHA256
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743
-
SHA512
794f30895e43498d59449f680f6298b09a947003ff7f09a33ed2241a16cf5bfcaf06968511bf95e2d4ecb2554a19ca936396e21128b0a32bc9e6ce636ce6c6d5
-
SSDEEP
12288:Yes3/5HnQc1x6qDCRSMXZrT12L1fRFen:zwBHN3FDF0TMRfR8
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-