General
-
Target
08cdc9e60803ba426c8fe8a281fcedc8c9990d8cc3b706eb613f34cbaeb23bf0.exe
-
Size
558KB
-
Sample
240606-beq92adc5v
-
MD5
5b69e26300ba5035ce6f6d8979061b34
-
SHA1
dd4d666e576592867437bb7b6e9766e3e81f1930
-
SHA256
08cdc9e60803ba426c8fe8a281fcedc8c9990d8cc3b706eb613f34cbaeb23bf0
-
SHA512
c930c7e7b1ccebf73c15c76791d503c5fea64e2e81c3e22a2e6be757ee3aea51102a65a2bd733a7aecb9277d3bb978a06feb53a2083c9b5eee3be2f7bb03df88
-
SSDEEP
12288:W3qyJM+m7bPc7nwYq+rqOxOs2I4iSj6f9D1pUkun:W6O87Linwd+rq6OuVl1pUkun
Static task
static1
Behavioral task
behavioral1
Sample
08cdc9e60803ba426c8fe8a281fcedc8c9990d8cc3b706eb613f34cbaeb23bf0.exe
Resource
win7-20240215-en
Malware Config
Extracted
lokibot
http://mtuogioanis.com/mad/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
08cdc9e60803ba426c8fe8a281fcedc8c9990d8cc3b706eb613f34cbaeb23bf0.exe
-
Size
558KB
-
MD5
5b69e26300ba5035ce6f6d8979061b34
-
SHA1
dd4d666e576592867437bb7b6e9766e3e81f1930
-
SHA256
08cdc9e60803ba426c8fe8a281fcedc8c9990d8cc3b706eb613f34cbaeb23bf0
-
SHA512
c930c7e7b1ccebf73c15c76791d503c5fea64e2e81c3e22a2e6be757ee3aea51102a65a2bd733a7aecb9277d3bb978a06feb53a2083c9b5eee3be2f7bb03df88
-
SSDEEP
12288:W3qyJM+m7bPc7nwYq+rqOxOs2I4iSj6f9D1pUkun:W6O87Linwd+rq6OuVl1pUkun
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing common artifacts observed in infostealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-