General
-
Target
Documents_details_info.rar
-
Size
575KB
-
Sample
240516-hxneeshc6t
-
MD5
6aee8cc5fe616daf2c72025f6f0e8256
-
SHA1
2dc910f2fd34f06e8ea7644cb59f871bc81e7500
-
SHA256
0973a20a76fb293002cb75b439b30838afe9257cfb0aa9d0b93b02a032fd6ac9
-
SHA512
466c41c36a80e331fbc43944a23fb0ce415b94da7c9a8f5a695a0c68d99a6ed17be5976496aebb343c3e3fcc7383c662ab21e3befdc26f02c5d2acbd0b9a32ba
-
SSDEEP
12288:nyW4YcF4X7LCH3oDmqNQ3FimXBEPIx9p3WmJ6G0KwwFM88f07Y:nVfLyoNQ30mXB8Q9nQGswF/U07Y
Static task
static1
Behavioral task
behavioral1
Sample
Documents_details_info.exe
Resource
win7-20240221-en
Malware Config
Extracted
lokibot
http://spencerstuartllc.top/evie2/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Documents_details_info.exe
-
Size
711KB
-
MD5
8442630945fb45d52873adb092715013
-
SHA1
477b80dcb20332c8883efda37fa5aca7a0daf4af
-
SHA256
864951bb748b7cf1dac9a0a2801ea3db551bfc3d32f19fa2dae3861d52b6427c
-
SHA512
5122b722be109c51ffc79b4c4ab21275c508adad731aa196d9e518479877df7db7ed37f4d6f442fdb8827b4670ef7abc8706d36ccaf6f2ae0223043efd706d7d
-
SSDEEP
12288:yrS0gpQflQh/uEf13p9oX1zPx/6N/6tSbDvsUMkZ+9MBEo5ZlV:y2jpZ/Bf1fM17xS/vb9Q9MBBblV
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-