General
-
Target
17052024_0121_16052024_Booking number_4AD69200IN4.rar
-
Size
521KB
-
Sample
240517-bq58bsag2t
-
MD5
3a20a3f9fdcf78430d67bbc98c623dab
-
SHA1
e862c03c00f6722cfc18402cfc829cebdb0c1142
-
SHA256
cb652ef8acca969d32fa21948468cf2c6cb871e8076671ef22318781fee2176d
-
SHA512
3b9e15748b87a9fc995fb67cbde2e90b2259bf45f44edc924d952404cef210bfdeb6a4dd26d1e3dd8885da9a674e42ef3e98c527c73e31d30d1c339d15680b0c
-
SSDEEP
12288:iykrS1bg5mEFNezLgADaZDlB3Bp+t2mAUzOtuXZvukax7:iR34EiLgdP3BpLmj7XZvnaB
Static task
static1
Behavioral task
behavioral1
Sample
U9MIn5ATFJUc3Ki.exe
Resource
win7-20240508-en
Malware Config
Extracted
lokibot
http://ransomproducts.top/kin/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
U9MIn5ATFJUc3Ki.exe
-
Size
560KB
-
MD5
48dea49e21ebe69a63cd48700293c05d
-
SHA1
854e9880e37e4eb298260a95a7b3c2f3cfbbd672
-
SHA256
3a5d03976f0bfaf997300d2a4c3bbb8e2f7b5f2ac06535e6ed3f59de137d1467
-
SHA512
b2b37072594fbc339134a98d0d10967967b6882bd3e4f153a1e38200d52059456ebb2e0088aea03b9099623b2769b09fd982b9bfa7cc93ee5644584f702a2810
-
SSDEEP
12288:x0pei36RAdUQGuk3qyqfw1N9OEFWliaz5Wk7Al10AbL3wW+7:Gpp36gUQGbww1N8Wwz5x8l10AP3e
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-