General
-
Target
3fe0e87c688c3fbdeabc167527a2c46e54b6376d0eca111c8658d22a652615e4.exe
-
Size
704KB
-
Sample
240604-sawgmaah2t
-
MD5
939ba19458ba714f7863718825b66de1
-
SHA1
6376d4e96d1c2e8efbb556a74600bd3edc6da682
-
SHA256
3fe0e87c688c3fbdeabc167527a2c46e54b6376d0eca111c8658d22a652615e4
-
SHA512
10fc65cd8777a75db6ad060adfe51203c3088d6773b619751be5b14fce48cdbe084f16b1de3878733982c565cd6a60c7aa9fe00262fa9d94a8dcd458a53f236d
-
SSDEEP
12288:EMYeaky/Qa0KP1x+kPwu9J5Y38YLt/rFfaDPlGm7fUENwqy0fd3C/lRKxhtaycy/:EMYeR7N5izz7Vw/0fdw4tV4PU
Static task
static1
Behavioral task
behavioral1
Sample
3fe0e87c688c3fbdeabc167527a2c46e54b6376d0eca111c8658d22a652615e4.exe
Resource
win7-20240215-en
Malware Config
Extracted
lokibot
http://sempersim.su/d1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
3fe0e87c688c3fbdeabc167527a2c46e54b6376d0eca111c8658d22a652615e4.exe
-
Size
704KB
-
MD5
939ba19458ba714f7863718825b66de1
-
SHA1
6376d4e96d1c2e8efbb556a74600bd3edc6da682
-
SHA256
3fe0e87c688c3fbdeabc167527a2c46e54b6376d0eca111c8658d22a652615e4
-
SHA512
10fc65cd8777a75db6ad060adfe51203c3088d6773b619751be5b14fce48cdbe084f16b1de3878733982c565cd6a60c7aa9fe00262fa9d94a8dcd458a53f236d
-
SSDEEP
12288:EMYeaky/Qa0KP1x+kPwu9J5Y38YLt/rFfaDPlGm7fUENwqy0fd3C/lRKxhtaycy/:EMYeR7N5izz7Vw/0fdw4tV4PU
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-