General
-
Target
Maersk_Quotation.exe
-
Size
511KB
-
Sample
240522-xa7xwacc7w
-
MD5
f2d55ec329334c5d13fb1439f6754446
-
SHA1
7461496b2116ca68460e5fa80028ea2415617905
-
SHA256
e481570083647729483d0356cb21b4a41f9007e04ae45c7d35ea728c46cdd2f1
-
SHA512
1c0a4434a011a9415cc545c89731c38849796f43b5305d9d779d6af5d74e7052e897e1e72f66dacaa3b50fa4ab4d142c26b50b47162ca983e262e8c09664b807
-
SSDEEP
12288:Q5zi8LkpEaEzjKGXCHtoeVDLPTJ3OzEjNDAmTTRJgKnXY:Q52jE9nKGXWt/VD96EjND9Z
Static task
static1
Behavioral task
behavioral1
Sample
Maersk_Quotation.exe
Resource
win7-20240221-en
Malware Config
Extracted
lokibot
http://sempersim.su/d1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Maersk_Quotation.exe
-
Size
511KB
-
MD5
f2d55ec329334c5d13fb1439f6754446
-
SHA1
7461496b2116ca68460e5fa80028ea2415617905
-
SHA256
e481570083647729483d0356cb21b4a41f9007e04ae45c7d35ea728c46cdd2f1
-
SHA512
1c0a4434a011a9415cc545c89731c38849796f43b5305d9d779d6af5d74e7052e897e1e72f66dacaa3b50fa4ab4d142c26b50b47162ca983e262e8c09664b807
-
SSDEEP
12288:Q5zi8LkpEaEzjKGXCHtoeVDLPTJ3OzEjNDAmTTRJgKnXY:Q52jE9nKGXWt/VD96EjND9Z
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-