General
-
Target
6bedede89d5da863ed511594e3fb7c5e18a113ccdbd0f8d7611bcfe61f59641d.exe
-
Size
617KB
-
Sample
240603-bgs7eadf7w
-
MD5
3386773652cab6d42e5eb77f33b414c2
-
SHA1
46af3a4f285a71a1f27b67e79359d980612226b4
-
SHA256
6bedede89d5da863ed511594e3fb7c5e18a113ccdbd0f8d7611bcfe61f59641d
-
SHA512
cd6f3a152ae82ea19686f83d26eac06e888dfe753bb8fc863570a2a1a6db3b9c5fedf910b71e2d40886c07d650c4b35faf69c1f322560bc67539728b9aceb7c2
-
SSDEEP
12288:l2iKVaUqdJS4Vo5pLRpHiANQ6elKQI64i55oc:Y+UgSckQ61Qd4iToc
Static task
static1
Behavioral task
behavioral1
Sample
6bedede89d5da863ed511594e3fb7c5e18a113ccdbd0f8d7611bcfe61f59641d.exe
Resource
win7-20240508-en
Malware Config
Extracted
lokibot
http://namex-na.com/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
6bedede89d5da863ed511594e3fb7c5e18a113ccdbd0f8d7611bcfe61f59641d.exe
-
Size
617KB
-
MD5
3386773652cab6d42e5eb77f33b414c2
-
SHA1
46af3a4f285a71a1f27b67e79359d980612226b4
-
SHA256
6bedede89d5da863ed511594e3fb7c5e18a113ccdbd0f8d7611bcfe61f59641d
-
SHA512
cd6f3a152ae82ea19686f83d26eac06e888dfe753bb8fc863570a2a1a6db3b9c5fedf910b71e2d40886c07d650c4b35faf69c1f322560bc67539728b9aceb7c2
-
SSDEEP
12288:l2iKVaUqdJS4Vo5pLRpHiANQ6elKQI64i55oc:Y+UgSckQ61Qd4iToc
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing common artifacts observed in infostealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-