General
-
Target
9235a13335a70e0933e4b0c98823a65045199e10cb43d0bd01ea1e99296aeb37
-
Size
502KB
-
Sample
240417-qhzsxaha32
-
MD5
11084b0b87c86328c1e303efc59e3d1c
-
SHA1
6b5593e27cc9137beb5da687fe685686c7a47191
-
SHA256
9235a13335a70e0933e4b0c98823a65045199e10cb43d0bd01ea1e99296aeb37
-
SHA512
41c08345423c330689c1c3f98f06309465b4f5ce496b2ed456885b92a61c63e6d8a9e2890c3dbbfd9c902d92360a6d11b09ac765c59a1a424ecff776763c0b54
-
SSDEEP
12288:jVSosSDW3Ddpw9Pa/Upt0Lcd5QQfYvDRNQ2kyzVviYOMaSgzOHYdhlpO:psSDW35pkuetkcd5pfsE2PzVnPgzOHYK
Static task
static1
Behavioral task
behavioral1
Sample
7cc872c2db97ac517a53904af50ad37dd08ca934fd1a48d4ebbd4c593c9cf528.exe
Resource
win7-20240221-en
Malware Config
Extracted
lokibot
https://sempersim.su/c17/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
7cc872c2db97ac517a53904af50ad37dd08ca934fd1a48d4ebbd4c593c9cf528.exe
-
Size
535KB
-
MD5
dce3a42744dfd9236299039e09ed1fc9
-
SHA1
e677a7accc88342822454c28a55cee05cc8d0ac0
-
SHA256
7cc872c2db97ac517a53904af50ad37dd08ca934fd1a48d4ebbd4c593c9cf528
-
SHA512
ce85b18d067cf01f9563cd8c85f6eeba64f32cd55682a0a51fe7bdf2d395d69e5712ba88f88f9a890c3366125266e9319f3766adba30d80c695de553db2427de
-
SSDEEP
12288:J8/xQNl/Wqq9WylY3mVOgfhl9ZFn2IGkPyIfDD/zy/wlEYi:2mZy1VOgfb9NYU3r76
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-