General
-
Target
2af57029908ba3701cd08efe856d0396b43500127ada231da75cb73c795c727a.exe
-
Size
522KB
-
Sample
240523-bmj6pagd32
-
MD5
f45b1ef0b8c2653b0e858c1760c610b2
-
SHA1
e9feae326fe61d7d6e8310a0461c0a41ebdfc188
-
SHA256
2af57029908ba3701cd08efe856d0396b43500127ada231da75cb73c795c727a
-
SHA512
23230519e9ac1d78d1788a88937f1c0bf2abc06d2d4981961110d305fdb7f677cf8ae6259c23fa0dc1231af65f09dd3c44da373f7fa39373538abe0e33ce835a
-
SSDEEP
12288:1jth71EMA+P+8n2MTDgba0OpVcDQjmU/RjXf7vsuVFGW5ZUWxiN85Hv:1jD1pA+28hTDOa0OCQ62fuGZb5
Static task
static1
Behavioral task
behavioral1
Sample
2af57029908ba3701cd08efe856d0396b43500127ada231da75cb73c795c727a.exe
Resource
win7-20240221-en
Malware Config
Extracted
lokibot
http://sempersim.su/d1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
2af57029908ba3701cd08efe856d0396b43500127ada231da75cb73c795c727a.exe
-
Size
522KB
-
MD5
f45b1ef0b8c2653b0e858c1760c610b2
-
SHA1
e9feae326fe61d7d6e8310a0461c0a41ebdfc188
-
SHA256
2af57029908ba3701cd08efe856d0396b43500127ada231da75cb73c795c727a
-
SHA512
23230519e9ac1d78d1788a88937f1c0bf2abc06d2d4981961110d305fdb7f677cf8ae6259c23fa0dc1231af65f09dd3c44da373f7fa39373538abe0e33ce835a
-
SSDEEP
12288:1jth71EMA+P+8n2MTDgba0OpVcDQjmU/RjXf7vsuVFGW5ZUWxiN85Hv:1jD1pA+28hTDOa0OCQ62fuGZb5
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing common artifacts observed in infostealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-