General
-
Target
98c6fb4cb9e723b5f1c808712eec0d52.bin
-
Size
528KB
-
Sample
240601-c786zsfh57
-
MD5
fa0a80d156983a6e8a20a200d97580d5
-
SHA1
bd29e7ce4ff0eb7546b4508e89ee6ef0d5f3b399
-
SHA256
e9ae7183c796ed8b84ba7fd22f3d288f7d1d282950918fc679290d83d73643c6
-
SHA512
faf0b01e22cc89f676cce48121fd88ff51ca0a84e5c542fb4633aa54996fe68164fa8564c4eb55964db7e14ba17f4f30f0e4d6a3fb222d0b44555ce60c7b2f43
-
SSDEEP
12288:purH7gi0yKhtowz9hMKyvLCrUdtU9Wf5bw6ZPwmQ:kr8qIXzoLC/Mxb3ih
Static task
static1
Behavioral task
behavioral1
Sample
dd3341463f2933f69a5ef356a2611ed92421027488f2b6b083d2e0470e005f5a.exe
Resource
win7-20240221-en
Malware Config
Extracted
lokibot
http://sempersim.su/d1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
dd3341463f2933f69a5ef356a2611ed92421027488f2b6b083d2e0470e005f5a.exe
-
Size
552KB
-
MD5
98c6fb4cb9e723b5f1c808712eec0d52
-
SHA1
e0f59529bd07ed6cd1c930eb8cffe008347ce5e3
-
SHA256
dd3341463f2933f69a5ef356a2611ed92421027488f2b6b083d2e0470e005f5a
-
SHA512
85575ff05bc97af529210223f315444fcc1cdb89374ba3e01144212c6914ba5b93fc88e03e730e55943bd4eb507bfb194e0f67abfec9d1bc17ca9e46def106eb
-
SSDEEP
12288:ZTJKksdrJwKcIg2gcFS7rC+bPPxzhPwN0K9lb6ed:GcIgcFQrC+D1SN0KXb6
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-