General
-
Target
SecuriteInfo.com.W32.MSIL_Agent.IGJ.gen.Eldorado.22518.20282.exe
-
Size
672KB
-
Sample
240627-qwsxhstele
-
MD5
e4979c53302e30f656edf76043b5944a
-
SHA1
0da3297c718121717f9379d6bb27a1c236060c18
-
SHA256
3b253bddd8e49b0353b44254fdc82c53c1614f5c2d09e2fde95698ad3a7815a0
-
SHA512
e21cb87346a76614d11ed5dc090a3c98dfa56c6c151bf99be6de5c8bc00f0ecd1481b0993f77886812a88af89ce0bc98a918fbd1572e244470f571799ed08891
-
SSDEEP
12288:nT3mljcpsnIyn5AyFGdWj8uVD7PmFpz7bYJPRaBYDHovmmEHt9NbuBU2ZE8xmOmu:TCooX5A3WtF+F9WZHSmFS
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.MSIL_Agent.IGJ.gen.Eldorado.22518.20282.exe
Resource
win7-20240611-en
Malware Config
Extracted
lokibot
http://midwestsoil.top/alpha/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
SecuriteInfo.com.W32.MSIL_Agent.IGJ.gen.Eldorado.22518.20282.exe
-
Size
672KB
-
MD5
e4979c53302e30f656edf76043b5944a
-
SHA1
0da3297c718121717f9379d6bb27a1c236060c18
-
SHA256
3b253bddd8e49b0353b44254fdc82c53c1614f5c2d09e2fde95698ad3a7815a0
-
SHA512
e21cb87346a76614d11ed5dc090a3c98dfa56c6c151bf99be6de5c8bc00f0ecd1481b0993f77886812a88af89ce0bc98a918fbd1572e244470f571799ed08891
-
SSDEEP
12288:nT3mljcpsnIyn5AyFGdWj8uVD7PmFpz7bYJPRaBYDHovmmEHt9NbuBU2ZE8xmOmu:TCooX5A3WtF+F9WZHSmFS
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-