General
-
Target
2922c109e30c924b0bc979434cc36f52.bin
-
Size
161KB
-
Sample
240726-b7gaja1hrb
-
MD5
e6ddfee4ca3278eef7ea43a9a4df6853
-
SHA1
d876908f95f5e85c22b5e89461aa7572cae836fd
-
SHA256
d8df96a70be6ca8efaccddcdf93adb72cf186788a4ef2c6a23389e6a38d7dac3
-
SHA512
0f1b91d677ff6908b12a9a72aa7d332d7702d65529fd128c6d78d7006e6b2b95a75d502887aaae64ae3d4a18e4ce0b33176f59a72b26fdbd199e5a392c66a3e6
-
SSDEEP
3072:z3m+Wi6Tu9rFlZvfRKcpC0ha6kL0AM0hk7xwzRnhEKhkxZS6K:z3m7iyu9RnpP7e0ADhk7xwzAF/u
Static task
static1
Behavioral task
behavioral1
Sample
28766d53e02141d8332cdb160ebbc4bee6df26596d0c041e15aae650d6613d32.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
28766d53e02141d8332cdb160ebbc4bee6df26596d0c041e15aae650d6613d32.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
lokibot
http://164.90.194.235/?id=22044231991792986
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
28766d53e02141d8332cdb160ebbc4bee6df26596d0c041e15aae650d6613d32.exe
-
Size
270KB
-
MD5
2922c109e30c924b0bc979434cc36f52
-
SHA1
4230742e046551ddc3145baf6ef5dcf99ba394f2
-
SHA256
28766d53e02141d8332cdb160ebbc4bee6df26596d0c041e15aae650d6613d32
-
SHA512
db12152c664d45b6c7fcec8b13d8984da75b2bce265e006d1c7e013ad7183ff050ecdc908224060c99ad801365412bd4abe220d4ae8d5c6b7c669f8b27b2016b
-
SSDEEP
6144:E917J2Wor8Z4gPjdq5Q1a5Q75ybFvjyTLtnoa:EHTor8Z4gJGQp75qRy
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-