General
-
Target
dbdc2f5b2f7b338a4673cb4b5b207d72.bin
-
Size
162KB
-
Sample
240726-dzb2ysxakd
-
MD5
983582de94ea083f43948676bfe9b783
-
SHA1
bc1d29e1899f73d8ed2772a970e75f0d6c721815
-
SHA256
cdc5752aa11d41d823c524fdc0fdb017402e2bdf1cbfd8794f723c71556f33cd
-
SHA512
19556eb454f6c7a3f64f062b434f6f9b994c4ef49cb829359b672e14a006c4864c373306b2e7a3ae566a1fde5b5dca46be10ebc8a7e7a63536b7b889feef64eb
-
SSDEEP
3072:euTk/VcIW98ejl8iHeiNZEiQuLrEBMcYg52PZQrAlpS8zAbL1RshVR3tt9W:fINgKi+iNIIrEBTISIU8EbLEhbP4
Static task
static1
Behavioral task
behavioral1
Sample
d74ebe06d17fc8e347dda04ca17006fa2f24deb7df06617feb13bffdc9bee476.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d74ebe06d17fc8e347dda04ca17006fa2f24deb7df06617feb13bffdc9bee476.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
lokibot
http://164.90.194.235/?id=17007285853618101
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d74ebe06d17fc8e347dda04ca17006fa2f24deb7df06617feb13bffdc9bee476.exe
-
Size
271KB
-
MD5
dbdc2f5b2f7b338a4673cb4b5b207d72
-
SHA1
9d939273f145ee1d05d226d44e1256ea45625e4f
-
SHA256
d74ebe06d17fc8e347dda04ca17006fa2f24deb7df06617feb13bffdc9bee476
-
SHA512
235d2c120eda51a1f0652d7b44b12abe63e82f0d1a1ee4436eee9660fd8ec7f163167351743c46a1b7f3cafc92d5214c1c2a1baea8e41f22517896de87434489
-
SSDEEP
3072:C072IS3LradTKvOypCmyGJOB9P4+5F0Ogp/fqzVkB9a5nLum2/ZWbjM+dlNR6tAm:kaRY/0jWt+MOgpfqCBKL4B6p+tA8JoX
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-