General
-
Target
Maersk_Quotation.exe
-
Size
568KB
-
Sample
240520-g4yy3afd38
-
MD5
4e2a32898a1efd013915d15cc28b9039
-
SHA1
340557785d063449f120ccbed60371b4e45bb1ab
-
SHA256
20778595e538b4ef30d9053e1934b67f115d338f27a01e9a858f84e729fdce28
-
SHA512
0aaa866f4f3f38ab0859775cd75f1370d13c63d62307ef48f3b46a5ff8c517301509fdc99ce49754221834de6789583774deff8cb7651d4934e788f19b5e2bfc
-
SSDEEP
12288:+eWET/mr9Khj8lTbtmXPymsdgE49ZoCN4fPr+fCKKJ:+eWtCYX86iEsoTlJ
Static task
static1
Behavioral task
behavioral1
Sample
Maersk_Quotation.exe
Resource
win7-20240419-en
Malware Config
Extracted
lokibot
http://sempersim.su/d1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Maersk_Quotation.exe
-
Size
568KB
-
MD5
4e2a32898a1efd013915d15cc28b9039
-
SHA1
340557785d063449f120ccbed60371b4e45bb1ab
-
SHA256
20778595e538b4ef30d9053e1934b67f115d338f27a01e9a858f84e729fdce28
-
SHA512
0aaa866f4f3f38ab0859775cd75f1370d13c63d62307ef48f3b46a5ff8c517301509fdc99ce49754221834de6789583774deff8cb7651d4934e788f19b5e2bfc
-
SSDEEP
12288:+eWET/mr9Khj8lTbtmXPymsdgE49ZoCN4fPr+fCKKJ:+eWtCYX86iEsoTlJ
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-