General
-
Target
b4672b2216779a3b35febd3824fcb017d0a39ea9c488272fe80b50ea369e61d7
-
Size
617KB
-
Sample
240417-qzav4sbf5s
-
MD5
9948cff0008d8e60895029aad8b43d90
-
SHA1
785b8c30c28cc9f1fd93b365be3ddcf7da495dcc
-
SHA256
b4672b2216779a3b35febd3824fcb017d0a39ea9c488272fe80b50ea369e61d7
-
SHA512
dd6eb2aa96ef8348bfed3936e5d02a4148d6ec1d39a2d20c2ed9cad4d82c7b23cdeae307fc2bc0cae890fe5b86322890740d0bbf7c84659e935b2ccc75135a5a
-
SSDEEP
12288:W57lFf6JXqFjhf7Dkt1MD1uY4wCN6bI0tGVj0lmvt+sETF2:W5lFiJaFtDU1q1EH+I0t6j0lmV+sETs
Static task
static1
Behavioral task
behavioral1
Sample
3791b65b31a3b12f458e042509119c60c2b3abd4f40f4da81f7404b6fb7db268.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3791b65b31a3b12f458e042509119c60c2b3abd4f40f4da81f7404b6fb7db268.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
lokibot
http://91.92.252.146:4002/kioy/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
3791b65b31a3b12f458e042509119c60c2b3abd4f40f4da81f7404b6fb7db268.exe
-
Size
735KB
-
MD5
7733da960ee126b39752a737301c0f86
-
SHA1
414d654545da349c21e58f0ae28021fe48a6f02b
-
SHA256
3791b65b31a3b12f458e042509119c60c2b3abd4f40f4da81f7404b6fb7db268
-
SHA512
9b9f4c0e926e76950a781713667cd4dfa34002a3340b99877730e7db67ea2a0dc7245518a1a943c388abc5dcd489737a1a88873c12deb028f788c8a3cd94d9d6
-
SSDEEP
12288:NcrNS33L10QdrXjKDnuFeDnnHgnS61NNyz3Pbpv08kMZYS:wNA3R5drXGDuFmASO7y10gZYS
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-