General
-
Target
gunzipped.exe
-
Size
558KB
-
Sample
240605-cfjr1sba4y
-
MD5
5b69e26300ba5035ce6f6d8979061b34
-
SHA1
dd4d666e576592867437bb7b6e9766e3e81f1930
-
SHA256
08cdc9e60803ba426c8fe8a281fcedc8c9990d8cc3b706eb613f34cbaeb23bf0
-
SHA512
c930c7e7b1ccebf73c15c76791d503c5fea64e2e81c3e22a2e6be757ee3aea51102a65a2bd733a7aecb9277d3bb978a06feb53a2083c9b5eee3be2f7bb03df88
-
SSDEEP
12288:W3qyJM+m7bPc7nwYq+rqOxOs2I4iSj6f9D1pUkun:W6O87Linwd+rq6OuVl1pUkun
Static task
static1
Behavioral task
behavioral1
Sample
gunzipped.exe
Resource
win7-20240221-en
Malware Config
Extracted
lokibot
http://mtuogioanis.com/mad/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
gunzipped.exe
-
Size
558KB
-
MD5
5b69e26300ba5035ce6f6d8979061b34
-
SHA1
dd4d666e576592867437bb7b6e9766e3e81f1930
-
SHA256
08cdc9e60803ba426c8fe8a281fcedc8c9990d8cc3b706eb613f34cbaeb23bf0
-
SHA512
c930c7e7b1ccebf73c15c76791d503c5fea64e2e81c3e22a2e6be757ee3aea51102a65a2bd733a7aecb9277d3bb978a06feb53a2083c9b5eee3be2f7bb03df88
-
SSDEEP
12288:W3qyJM+m7bPc7nwYq+rqOxOs2I4iSj6f9D1pUkun:W6O87Linwd+rq6OuVl1pUkun
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-