General
-
Target
562f0bcc88b30a19f309f2cec7288ef29faa53d2b9d33a52f964f2e3b09324e5
-
Size
556KB
-
Sample
240628-kffdlazerf
-
MD5
9e3578db5336e49facb772d30d844b6f
-
SHA1
6afb36f273e2dce6ef512104c04b880337507fd7
-
SHA256
562f0bcc88b30a19f309f2cec7288ef29faa53d2b9d33a52f964f2e3b09324e5
-
SHA512
6f66a462a377dc9fa4c3fa6c8aa9f926237cec8a48fb2ec4edd468057f4f419d7d5e4156e71036702cb135a9ed540a340d1701ee41e7c6d8ff71e63419c440cd
-
SSDEEP
12288:zij+2dbCawDKSpZMKR7IJK316ejb/mg3L6DLwuHDnORLy1kR:3gwmOZMw76ejb/71KDn8OI
Static task
static1
Behavioral task
behavioral1
Sample
562f0bcc88b30a19f309f2cec7288ef29faa53d2b9d33a52f964f2e3b09324e5.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
lokibot
http://midwestsoil.top/alpha/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
562f0bcc88b30a19f309f2cec7288ef29faa53d2b9d33a52f964f2e3b09324e5
-
Size
556KB
-
MD5
9e3578db5336e49facb772d30d844b6f
-
SHA1
6afb36f273e2dce6ef512104c04b880337507fd7
-
SHA256
562f0bcc88b30a19f309f2cec7288ef29faa53d2b9d33a52f964f2e3b09324e5
-
SHA512
6f66a462a377dc9fa4c3fa6c8aa9f926237cec8a48fb2ec4edd468057f4f419d7d5e4156e71036702cb135a9ed540a340d1701ee41e7c6d8ff71e63419c440cd
-
SSDEEP
12288:zij+2dbCawDKSpZMKR7IJK316ejb/mg3L6DLwuHDnORLy1kR:3gwmOZMw76ejb/71KDn8OI
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-