General
-
Target
Maersk_Quotation.exe
-
Size
521KB
-
Sample
240528-es5alafd52
-
MD5
1b275f5b53b912b6f9f4944b426471a9
-
SHA1
e8fd9fec2eec13035730944c892ade741a663b84
-
SHA256
ed444e4abc5aa906302b3e79ca09c94b8320e23af176384799a2020344de4700
-
SHA512
09c35ad2425ca3abdf06b81aadd0bda5048c3f8ea117c1fb1184a9eee7fdd77391af018a8a79bcf7d8c9937dc97e17e8ce54a8d5e6ace6699460a420b510ef12
-
SSDEEP
12288:jKclV/xG9Ud3ckOitZmw0gaGhZnzdU4r0:+M0rkhZnzdU4r
Static task
static1
Behavioral task
behavioral1
Sample
Maersk_Quotation.exe
Resource
win7-20240220-en
Malware Config
Extracted
lokibot
http://sempersim.su/d1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Maersk_Quotation.exe
-
Size
521KB
-
MD5
1b275f5b53b912b6f9f4944b426471a9
-
SHA1
e8fd9fec2eec13035730944c892ade741a663b84
-
SHA256
ed444e4abc5aa906302b3e79ca09c94b8320e23af176384799a2020344de4700
-
SHA512
09c35ad2425ca3abdf06b81aadd0bda5048c3f8ea117c1fb1184a9eee7fdd77391af018a8a79bcf7d8c9937dc97e17e8ce54a8d5e6ace6699460a420b510ef12
-
SSDEEP
12288:jKclV/xG9Ud3ckOitZmw0gaGhZnzdU4r0:+M0rkhZnzdU4r
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-