General
-
Target
5b1b715cb6affcca630d5ab5e74527b2827aaec4e8c386a229c8960f4ec6b315
-
Size
590KB
-
Sample
240529-kwbqcahd2v
-
MD5
c2d926f3300f30cedcc641396388b2f1
-
SHA1
41fa8e11e3a27cbc2f20d57d1fc660e8eba25a08
-
SHA256
5b1b715cb6affcca630d5ab5e74527b2827aaec4e8c386a229c8960f4ec6b315
-
SHA512
48af9407d8584840da5a3fdfcc68adb60181eed56795e99ee4556620b1cdd125884aa60133967184e0e898deb99b00cf8b8ac141c5acb692964593943b415b4b
-
SSDEEP
12288:Hbgn6YzXp/TYT0oUFIHF+ctfzm9fWYAwjVDgBXSn09hsZkt/kR:7fsYT8IHF9FQfWSjVD8ta
Static task
static1
Behavioral task
behavioral1
Sample
5b1b715cb6affcca630d5ab5e74527b2827aaec4e8c386a229c8960f4ec6b315.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
lokibot
http://rocheholding.top/evie3/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
5b1b715cb6affcca630d5ab5e74527b2827aaec4e8c386a229c8960f4ec6b315
-
Size
590KB
-
MD5
c2d926f3300f30cedcc641396388b2f1
-
SHA1
41fa8e11e3a27cbc2f20d57d1fc660e8eba25a08
-
SHA256
5b1b715cb6affcca630d5ab5e74527b2827aaec4e8c386a229c8960f4ec6b315
-
SHA512
48af9407d8584840da5a3fdfcc68adb60181eed56795e99ee4556620b1cdd125884aa60133967184e0e898deb99b00cf8b8ac141c5acb692964593943b415b4b
-
SSDEEP
12288:Hbgn6YzXp/TYT0oUFIHF+ctfzm9fWYAwjVDgBXSn09hsZkt/kR:7fsYT8IHF9FQfWSjVD8ta
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-