General
-
Target
Zahtjevzaponudubroj20240704.cmd
-
Size
654KB
-
Sample
240704-ktzpdstajp
-
MD5
e014b69d3bff34e00e3aa99e7b383cf3
-
SHA1
27a6cba46a6de403420cc1a1f205a800ba418580
-
SHA256
11b5aa868e0562612520de22f135ad0a1a768cfa6fa0a8708b7f02f49594d925
-
SHA512
3f0d823183a6c9c08a2fbb5c7d3552f2f62b1f049be4370a99ca445156716cf82d139cc6269cf08e398e6e20c1c3c08a58daa72fcc8a6deccac59fd474fbf039
-
SSDEEP
12288:loGcaZaofC1PN5MhJ889qTxvgjg2fUsCeG9CCZ8ltoFzPwS4MABsPqijlmLt5kR:lhXS17MJhm5ifUsCN9CCZOtoCMb
Static task
static1
Behavioral task
behavioral1
Sample
Zahtjevzaponudubroj20240704.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Zahtjevzaponudubroj20240704.exe
Resource
win10-20240404-en
Malware Config
Extracted
lokibot
http://45.61.136.239/index.php/gyr.php?id=1
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Zahtjevzaponudubroj20240704.cmd
-
Size
654KB
-
MD5
e014b69d3bff34e00e3aa99e7b383cf3
-
SHA1
27a6cba46a6de403420cc1a1f205a800ba418580
-
SHA256
11b5aa868e0562612520de22f135ad0a1a768cfa6fa0a8708b7f02f49594d925
-
SHA512
3f0d823183a6c9c08a2fbb5c7d3552f2f62b1f049be4370a99ca445156716cf82d139cc6269cf08e398e6e20c1c3c08a58daa72fcc8a6deccac59fd474fbf039
-
SSDEEP
12288:loGcaZaofC1PN5MhJ889qTxvgjg2fUsCeG9CCZ8ltoFzPwS4MABsPqijlmLt5kR:lhXS17MJhm5ifUsCN9CCZOtoCMb
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-