General
-
Target
85c0413d7d9487f752bd2b8271337606.exe
-
Size
598KB
-
Sample
240802-qndgvsxbkj
-
MD5
85c0413d7d9487f752bd2b8271337606
-
SHA1
4c684ec979fcbafd08331879fdbe0ba3e4c2c494
-
SHA256
cc34009402c9e1a52c70b4f88a817c974a2fc454d4f1b7dbb3cdd21c24fbc073
-
SHA512
277ee8f9928c12459df2d65afc96bd139c9593af08c2ca995cc5165cacafd8e0194b05aa618a43a12f9c04b64ff532979f8346784fe3b59a133c6a0bacd39aa6
-
SSDEEP
12288:AcrNS33L10QdrX6X1n3apum4LIsXudBob4Z6lVSeJuBzUq26bUAd1:jNA3R5drXG13IutIBomEJocKUY
Static task
static1
Behavioral task
behavioral1
Sample
85c0413d7d9487f752bd2b8271337606.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
85c0413d7d9487f752bd2b8271337606.exe
Resource
win10v2004-20240730-en
Malware Config
Extracted
lokibot
http://94.156.66.169:5734/topwttsg/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
85c0413d7d9487f752bd2b8271337606.exe
-
Size
598KB
-
MD5
85c0413d7d9487f752bd2b8271337606
-
SHA1
4c684ec979fcbafd08331879fdbe0ba3e4c2c494
-
SHA256
cc34009402c9e1a52c70b4f88a817c974a2fc454d4f1b7dbb3cdd21c24fbc073
-
SHA512
277ee8f9928c12459df2d65afc96bd139c9593af08c2ca995cc5165cacafd8e0194b05aa618a43a12f9c04b64ff532979f8346784fe3b59a133c6a0bacd39aa6
-
SSDEEP
12288:AcrNS33L10QdrX6X1n3apum4LIsXudBob4Z6lVSeJuBzUq26bUAd1:jNA3R5drXG13IutIBomEJocKUY
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-