General
-
Target
Maersk_Gio9yurHsEB0b9r.exe
-
Size
552KB
-
Sample
240530-nwqfaaga9w
-
MD5
98c6fb4cb9e723b5f1c808712eec0d52
-
SHA1
e0f59529bd07ed6cd1c930eb8cffe008347ce5e3
-
SHA256
dd3341463f2933f69a5ef356a2611ed92421027488f2b6b083d2e0470e005f5a
-
SHA512
85575ff05bc97af529210223f315444fcc1cdb89374ba3e01144212c6914ba5b93fc88e03e730e55943bd4eb507bfb194e0f67abfec9d1bc17ca9e46def106eb
-
SSDEEP
12288:ZTJKksdrJwKcIg2gcFS7rC+bPPxzhPwN0K9lb6ed:GcIgcFQrC+D1SN0KXb6
Static task
static1
Behavioral task
behavioral1
Sample
Maersk_Gio9yurHsEB0b9r.exe
Resource
win7-20231129-en
Malware Config
Extracted
lokibot
http://sempersim.su/d1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Maersk_Gio9yurHsEB0b9r.exe
-
Size
552KB
-
MD5
98c6fb4cb9e723b5f1c808712eec0d52
-
SHA1
e0f59529bd07ed6cd1c930eb8cffe008347ce5e3
-
SHA256
dd3341463f2933f69a5ef356a2611ed92421027488f2b6b083d2e0470e005f5a
-
SHA512
85575ff05bc97af529210223f315444fcc1cdb89374ba3e01144212c6914ba5b93fc88e03e730e55943bd4eb507bfb194e0f67abfec9d1bc17ca9e46def106eb
-
SSDEEP
12288:ZTJKksdrJwKcIg2gcFS7rC+bPPxzhPwN0K9lb6ed:GcIgcFQrC+D1SN0KXb6
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-