General
-
Target
MalwareBazaar.3
-
Size
750KB
-
Sample
240802-p96j4axamk
-
MD5
e9d26537e90ed16f25562af4e1f32d67
-
SHA1
12815966f19753f9fa7035179138b449dc0281b3
-
SHA256
f66e2b6d93b2fe125c0c770926286c63716cb0538bf4e4bf6c47eff67b39b207
-
SHA512
0ecb24fe955c34fcf0ec3addb4813302c5fcc9c882ecbfcccb03c1657a94754073247d81d81f556e2ad3907adaa381a4607d12fc69dabd8637e09ba989941b31
-
SSDEEP
12288:UcrNS33L10QdrXPMztnIQ0oZCkv6JkDTziH4nIAdL+tFiZsQTZjWR7Tyr5W4uO3w:vNA3R5drXPUtI0ZCkvTOUN+tFimQq7TR
Static task
static1
Behavioral task
behavioral1
Sample
MalwareBazaar.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
MalwareBazaar.exe
Resource
win10v2004-20240730-en
Malware Config
Extracted
lokibot
http://94.156.66.169:5334/drhwttsg/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
MalwareBazaar.3
-
Size
750KB
-
MD5
e9d26537e90ed16f25562af4e1f32d67
-
SHA1
12815966f19753f9fa7035179138b449dc0281b3
-
SHA256
f66e2b6d93b2fe125c0c770926286c63716cb0538bf4e4bf6c47eff67b39b207
-
SHA512
0ecb24fe955c34fcf0ec3addb4813302c5fcc9c882ecbfcccb03c1657a94754073247d81d81f556e2ad3907adaa381a4607d12fc69dabd8637e09ba989941b31
-
SSDEEP
12288:UcrNS33L10QdrXPMztnIQ0oZCkv6JkDTziH4nIAdL+tFiZsQTZjWR7Tyr5W4uO3w:vNA3R5drXPUtI0ZCkvTOUN+tFimQq7TR
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-