General
-
Target
a543d340ecba5aa7ec7bbf66f24b2373e0b2ebc6e271694c2e6a173d531cb370.exe
-
Size
513KB
-
Sample
240523-cab5zshd4v
-
MD5
00a7efc44e42ece2610201794ba710fc
-
SHA1
ac0cd0c42d952abc412bab8a0a88a5cb2f908fe0
-
SHA256
a543d340ecba5aa7ec7bbf66f24b2373e0b2ebc6e271694c2e6a173d531cb370
-
SHA512
9d649b290c819487633d1f9e54a78a5d6969e5c4fc9dbf6aca76ec2986b03805b958131e919ad5a7524428c8407950b32a40ec4cf7e10acb8327cf7c29224456
-
SSDEEP
12288:clYifTSeoUTeH3+vFe9/on60HTAGXG6NI7hrFabA5:LiGe0H3K760zAGM7F
Static task
static1
Behavioral task
behavioral1
Sample
a543d340ecba5aa7ec7bbf66f24b2373e0b2ebc6e271694c2e6a173d531cb370.exe
Resource
win7-20240508-en
Malware Config
Extracted
lokibot
http://sempersim.su/d1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
a543d340ecba5aa7ec7bbf66f24b2373e0b2ebc6e271694c2e6a173d531cb370.exe
-
Size
513KB
-
MD5
00a7efc44e42ece2610201794ba710fc
-
SHA1
ac0cd0c42d952abc412bab8a0a88a5cb2f908fe0
-
SHA256
a543d340ecba5aa7ec7bbf66f24b2373e0b2ebc6e271694c2e6a173d531cb370
-
SHA512
9d649b290c819487633d1f9e54a78a5d6969e5c4fc9dbf6aca76ec2986b03805b958131e919ad5a7524428c8407950b32a40ec4cf7e10acb8327cf7c29224456
-
SSDEEP
12288:clYifTSeoUTeH3+vFe9/on60HTAGXG6NI7hrFabA5:LiGe0H3K760zAGM7F
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing common artifacts observed in infostealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-