General
-
Target
bUXxykcTPKqVTCw.exe
-
Size
470KB
-
Sample
240709-c6fhaavbpf
-
MD5
e5a6e7bbc815a510e258bc8c3c28a8e8
-
SHA1
1aec295b216472b8daeaed42794955a85ec9f9db
-
SHA256
8a28668302df8fea6ea0361fd4823410aea2dcd86934736e977b356ab9052a62
-
SHA512
afc41a66b48e241828735faab0c27dc663ee5dea0ac0ea3be3d9b534aa800a9a2f72264f4ac5b4649633246ec9d2c03916dfd0916f75dd45da148cf805f14a10
-
SSDEEP
12288:bkHHW9Gsb5A8ZDQr693BgsGduVHeFGlYTCFkDYgOKimg0:M29Gs68ZDQ0BgfuV+F/mFkDnHN
Static task
static1
Behavioral task
behavioral1
Sample
bUXxykcTPKqVTCw.exe
Resource
win7-20240705-en
Malware Config
Extracted
lokibot
http://kinltd.top/evie1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
bUXxykcTPKqVTCw.exe
-
Size
470KB
-
MD5
e5a6e7bbc815a510e258bc8c3c28a8e8
-
SHA1
1aec295b216472b8daeaed42794955a85ec9f9db
-
SHA256
8a28668302df8fea6ea0361fd4823410aea2dcd86934736e977b356ab9052a62
-
SHA512
afc41a66b48e241828735faab0c27dc663ee5dea0ac0ea3be3d9b534aa800a9a2f72264f4ac5b4649633246ec9d2c03916dfd0916f75dd45da148cf805f14a10
-
SSDEEP
12288:bkHHW9Gsb5A8ZDQr693BgsGduVHeFGlYTCFkDYgOKimg0:M29Gs68ZDQ0BgfuV+F/mFkDnHN
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-