General
-
Target
a17eeeebd01e2b2756e481339a001b068a4bf04f6b2e7626b39b1e77063507d7.exe
-
Size
596KB
-
Sample
240524-p1nb6add45
-
MD5
63c2c72a019bee6e49b658934f909336
-
SHA1
2c95922ec392ee67ec941b7e033c055cbf0b9492
-
SHA256
a17eeeebd01e2b2756e481339a001b068a4bf04f6b2e7626b39b1e77063507d7
-
SHA512
372c7c7ae5037d072589bba780cdf682bbd6590a26fd3093871162f837e583df16c15438787bfcf8da1ec6c18ee00adf4179797e11ecc47eccb69f3f9bd66846
-
SSDEEP
12288:KHwEV0vgLt3ZzZqZsENsXTUPYO0zqn4MHRifuoX0pWA0aJLZM/PxItBhIc+A:QwEpzseENa2YN+n1opiWiuPxqIc+A
Static task
static1
Behavioral task
behavioral1
Sample
a17eeeebd01e2b2756e481339a001b068a4bf04f6b2e7626b39b1e77063507d7.exe
Resource
win7-20231129-en
Malware Config
Extracted
lokibot
http://sssteell-com.asia/sht/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
a17eeeebd01e2b2756e481339a001b068a4bf04f6b2e7626b39b1e77063507d7.exe
-
Size
596KB
-
MD5
63c2c72a019bee6e49b658934f909336
-
SHA1
2c95922ec392ee67ec941b7e033c055cbf0b9492
-
SHA256
a17eeeebd01e2b2756e481339a001b068a4bf04f6b2e7626b39b1e77063507d7
-
SHA512
372c7c7ae5037d072589bba780cdf682bbd6590a26fd3093871162f837e583df16c15438787bfcf8da1ec6c18ee00adf4179797e11ecc47eccb69f3f9bd66846
-
SSDEEP
12288:KHwEV0vgLt3ZzZqZsENsXTUPYO0zqn4MHRifuoX0pWA0aJLZM/PxItBhIc+A:QwEpzseENa2YN+n1opiWiuPxqIc+A
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-