General
-
Target
ac82a4aa50ad21a166029cedbcde551f.bin
-
Size
573KB
-
Sample
240614-c4mtksscrd
-
MD5
717a2251047a6afd862862c36ec50af2
-
SHA1
92b39eb7097a138e134106ef71391ac55a9df635
-
SHA256
f96f66ed4d79565b462172a1e6f0a66ebdee9da9f54d7ebe28a569cc548888b6
-
SHA512
32230cbdad9fd95488ecebb52cd885c5153671e037550051a0b1f9ae649825aa18a3c2033f36cf5d7df59ca806f674746c9a07a12691989ec1205f28538be8a9
-
SSDEEP
12288:eF4LfZwMAiPhD4vN7Rb2rc4rt7lLOAWGGG7OmnRjFUvTyaNA+HteqAK:eOLfOqU67rt7lLOBGGG64P+JSuP
Static task
static1
Behavioral task
behavioral1
Sample
a013b7c79bff3e1ca817b809deb34f94ad2bd883ceb1f08427adaefaa95f1018.exe
Resource
win7-20240221-en
Malware Config
Extracted
lokibot
http://45.61.136.239/index.php/9460648709801952970
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
a013b7c79bff3e1ca817b809deb34f94ad2bd883ceb1f08427adaefaa95f1018.exe
-
Size
743KB
-
MD5
ac82a4aa50ad21a166029cedbcde551f
-
SHA1
26eed14a90fd7f8992660d375f3b77342183b13a
-
SHA256
a013b7c79bff3e1ca817b809deb34f94ad2bd883ceb1f08427adaefaa95f1018
-
SHA512
887790abbeca7376e17e4ceb35a6ee4819398c788ab7fce2e7be2868793b379b8f97926f003e584e9240dc73485aa7b7519c2a6d4707bd27c0fb1aa9def01145
-
SSDEEP
12288:hDfjMCvBwgSlhsAg1DI+VNJXZ+KJsVDoCOzJ9BZ83hMbcl+SDvXQKEmz:hDfggSlK71DIuZ+Cs2FwujSDvqm
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-