General
-
Target
proform invoice.exe
-
Size
562KB
-
Sample
240529-eegx5sad38
-
MD5
b0d8e1c1627e947fc3d0566b856a02c6
-
SHA1
fc25210ae92295d0b22accffaf767b0c4354f5de
-
SHA256
83761885d25f6efebd14c2b5e26965961fc59896c45a3fff0c1abf555e7b3482
-
SHA512
6ae235f56e138fa072dda60a41d37c7e995d45eb69338aa0c4088d49793e1f121813940b69015b779d4b0bb49d9abb24440881b282cb28f65019c164fbd729bf
-
SSDEEP
12288:I2iKVTc8dJS4VH3bBvFEdh5OlZ77mi3Wa/UAF9VUkXMY:73cqScXtN0qBHWa/UAFTUkXM
Static task
static1
Behavioral task
behavioral1
Sample
proform invoice.exe
Resource
win7-20240221-en
Malware Config
Extracted
lokibot
http://sempersim.su/d9/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
proform invoice.exe
-
Size
562KB
-
MD5
b0d8e1c1627e947fc3d0566b856a02c6
-
SHA1
fc25210ae92295d0b22accffaf767b0c4354f5de
-
SHA256
83761885d25f6efebd14c2b5e26965961fc59896c45a3fff0c1abf555e7b3482
-
SHA512
6ae235f56e138fa072dda60a41d37c7e995d45eb69338aa0c4088d49793e1f121813940b69015b779d4b0bb49d9abb24440881b282cb28f65019c164fbd729bf
-
SSDEEP
12288:I2iKVTc8dJS4VH3bBvFEdh5OlZ77mi3Wa/UAF9VUkXMY:73cqScXtN0qBHWa/UAFTUkXM
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-