General
-
Target
4516944be6bb32f6a499dae6e1e8b973e8dcfb5b.zip
-
Size
470KB
-
Sample
240528-phmmxada5v
-
MD5
8dc284db5cfdbaf263576a70b02fa180
-
SHA1
b27a8206be6940aaec58cf7bfe83544ef24e8257
-
SHA256
e52aa3f61ccaae900f29c3b55f77f0874a46940baec7af3e100bb21c1777a1f3
-
SHA512
f92fcf020e71643f73c35d0c165aad2597c542c90b8fa2aff6e80de9143f6155898bf2fb0c652e73d2c863d817eed3f5ddd90db9fdb16c52ff08c1253a5a48fb
-
SSDEEP
12288:zP9yPJjKGNM/VNXeTERu+T1WkLBDThqBcs+GabkLtnk67l6:zuJjTW2Tyu+hJgcELlP7Q
Static task
static1
Behavioral task
behavioral1
Sample
Hapag-Lloyd payment advice.exe
Resource
win7-20240508-en
Malware Config
Extracted
lokibot
http://metallc.top/sath/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Hapag-Lloyd payment advice.exe
-
Size
482KB
-
MD5
a7238eb78e81eb4d885fa1768fc45543
-
SHA1
7c2f559ec7de4c767c87992fc28c54050849bff8
-
SHA256
66111967447c40fa6d06b045f856f635f5bb09092087a9ec89c939c0dcf5d938
-
SHA512
6a62a4e1f4dd8534fdddd78ad4f3750be63d08398129e0211da2baece5844976837229f5ccb25aeadc06397f0f6c8f6a21ab01139e0cef4b4bea05948cdfd6fb
-
SSDEEP
12288:I/6Mo012irk6h8lQXaWxxaw7MspkEkO0ye1E1:gocNk6k7WbYsqP/1+
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-