General
-
Target
3fea3c47ccd17c676d8f4cc00c535cf47558b3ad06fc0e4844efe01eaff96148
-
Size
473KB
-
Sample
240417-qpgkxahd45
-
MD5
72855097108258a1bf94373124406b08
-
SHA1
4c7795f77ba2369fcd2917d149778cf20add31f0
-
SHA256
3fea3c47ccd17c676d8f4cc00c535cf47558b3ad06fc0e4844efe01eaff96148
-
SHA512
292c4d82bbafe084d311632a223b984f69d5e1995efb083d4b7a958c67858329de79cae1721a90b1441db8393ce86a9da1ee1bb398abff9f672e931d19f53cd4
-
SSDEEP
12288:6yX4O467Fg6dqPgHLIHMI0WrC+tGQ3/zPXi+jXa3CfdoJr6usRvoo:1X4O4x68YrZ+tG8Zfdol6uavV
Static task
static1
Behavioral task
behavioral1
Sample
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
lokibot
https://sempersim.su/c16/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743.exe
-
Size
490KB
-
MD5
a8f86e43a86f3e0047342917a3b4d823
-
SHA1
90e606c3aa0f2e7e438ad0eb4e43a391adf7af6a
-
SHA256
454e87da084f762d25dcb7858795f6bb6cd549cc0f1435177121b0eb66c17743
-
SHA512
794f30895e43498d59449f680f6298b09a947003ff7f09a33ed2241a16cf5bfcaf06968511bf95e2d4ecb2554a19ca936396e21128b0a32bc9e6ce636ce6c6d5
-
SSDEEP
12288:Yes3/5HnQc1x6qDCRSMXZrT12L1fRFen:zwBHN3FDF0TMRfR8
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-