General
-
Target
Maersk_Quotation.exe
-
Size
560KB
-
Sample
240516-s5b2gabh69
-
MD5
169780a46f76750795f20c6ace3a0efd
-
SHA1
5dace2b67be08c5e759098bb0eaefa1915c4e7bc
-
SHA256
7d72439e82ac01968abb65c833b9feb73e8b59337408f5d347c754615e579920
-
SHA512
1759c734f8fa0b3762efa58a24e11f1ea4ca883ed00b0b29882bf02cc6848b5dab29a723cbb29d53c75a5a20d204086d21df7d7bc3645a7df06fefdb4b5a71b9
-
SSDEEP
12288:I0pei36Reiy/vwTEJnoT+AfoFROFvYR7ubZ5hn92c3oNBw+kzVZXx:Lpp36hy/2EJo3gFROFAAbZ5hcOiBw+kd
Static task
static1
Behavioral task
behavioral1
Sample
Maersk_Quotation.exe
Resource
win7-20240419-en
Malware Config
Extracted
lokibot
http://sempersim.su/d1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Maersk_Quotation.exe
-
Size
560KB
-
MD5
169780a46f76750795f20c6ace3a0efd
-
SHA1
5dace2b67be08c5e759098bb0eaefa1915c4e7bc
-
SHA256
7d72439e82ac01968abb65c833b9feb73e8b59337408f5d347c754615e579920
-
SHA512
1759c734f8fa0b3762efa58a24e11f1ea4ca883ed00b0b29882bf02cc6848b5dab29a723cbb29d53c75a5a20d204086d21df7d7bc3645a7df06fefdb4b5a71b9
-
SSDEEP
12288:I0pei36Reiy/vwTEJnoT+AfoFROFvYR7ubZ5hn92c3oNBw+kzVZXx:Lpp36hy/2EJo3gFROFAAbZ5hcOiBw+kd
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-