General
-
Target
169780a46f76750795f20c6ace3a0efd.bin
-
Size
529KB
-
Sample
240518-bc8rascd4v
-
MD5
d4bd86ebea737a92b0475b4db6bd644d
-
SHA1
cf13db61c6a2b6c9daf1c1ff8f328d473f018b90
-
SHA256
46b20cad71763c153c701d798bc5e8fedb17660746458a658d53de8f054afaac
-
SHA512
2d081da92feaeaf022791075c74d710f099546951a01f9c78f448419a19f1f802193a0d116951083ac7c699467b67c0700cc033a695580b23d44bbbf3cebd6bd
-
SSDEEP
12288:lKleiVOJV2vA1u586ZCA53YSQxEfnApOsFNe8VTVc:FiaVzQ8hu32FG
Static task
static1
Behavioral task
behavioral1
Sample
7d72439e82ac01968abb65c833b9feb73e8b59337408f5d347c754615e579920.exe
Resource
win7-20240419-en
Malware Config
Extracted
lokibot
http://sempersim.su/d1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
7d72439e82ac01968abb65c833b9feb73e8b59337408f5d347c754615e579920.exe
-
Size
560KB
-
MD5
169780a46f76750795f20c6ace3a0efd
-
SHA1
5dace2b67be08c5e759098bb0eaefa1915c4e7bc
-
SHA256
7d72439e82ac01968abb65c833b9feb73e8b59337408f5d347c754615e579920
-
SHA512
1759c734f8fa0b3762efa58a24e11f1ea4ca883ed00b0b29882bf02cc6848b5dab29a723cbb29d53c75a5a20d204086d21df7d7bc3645a7df06fefdb4b5a71b9
-
SSDEEP
12288:I0pei36Reiy/vwTEJnoT+AfoFROFvYR7ubZ5hn92c3oNBw+kzVZXx:Lpp36hy/2EJo3gFROFAAbZ5hcOiBw+kd
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-