General
-
Target
dc17496f619e7a6c9b6fc7392fc8448434bb6b43ecf25431e997be9e7f75fd06
-
Size
489KB
-
Sample
240601-hpz39aea52
-
MD5
7157a0510a65b0692d3b2c0b03dfeeb4
-
SHA1
b91169e5874927f480fb9411b8aa974d5a526f55
-
SHA256
dc17496f619e7a6c9b6fc7392fc8448434bb6b43ecf25431e997be9e7f75fd06
-
SHA512
6988a0ae4ed00307be10ad3b3a2f7b2f92d712d23ba347ed3133d0f70b82a020f28ec02332b2228d8eba479b34d834b9a4a9d48f83aead27d468ade7f3ee3d9c
-
SSDEEP
6144:yfR9iw9I/WrZTQ8qvl9ac2zU+bw1i/yoS1jsW79N/ni+bFmBq5AM/WSiVjzCBaJb:yfR6er1WavJk1i/FSxDnNBgeWBCm
Static task
static1
Behavioral task
behavioral1
Sample
3b0af3f5146f9d1461b10e6535dc47bea08ae7f8f728542aaba25e5cc8d914e0.exe
Resource
win7-20240221-en
Malware Config
Extracted
lokibot
http://sempersim.su/d10/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
3b0af3f5146f9d1461b10e6535dc47bea08ae7f8f728542aaba25e5cc8d914e0.exe
-
Size
537KB
-
MD5
67eb26d7f0aaa1e001828b5d2bfae149
-
SHA1
364524ec9b431c4bb82f7e2c31480275c82133d8
-
SHA256
3b0af3f5146f9d1461b10e6535dc47bea08ae7f8f728542aaba25e5cc8d914e0
-
SHA512
58edb5e7d57603f9f653a8ccc4e4e65aa62f207aaab59a4d87caabe30f3f927e80f6d2954744180a84ea3bed2c5870892e342193d30d90f694260432eb9c3e96
-
SSDEEP
12288:HbBPJwKcI5JG/d4m5wg3SRV1RUHsuVK+BEL1D1X5OlK0QK0mV91H:7BhcsGV4YSRV7fuVKdbOl+Kx3
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-