General
-
Target
2360bb0b42650f2feb47a0e988ccc3ea.exe
-
Size
730KB
-
Sample
240802-sx2bdszckn
-
MD5
2360bb0b42650f2feb47a0e988ccc3ea
-
SHA1
0712817e7fabe68e34d67ce4151728d9f2eb8cba
-
SHA256
5156add523f08eb7eabb51f3ce648d6f93c646bec4c6cee7dd59d95e5b50b2b3
-
SHA512
d95afaa69795cfa63bed2e22f98bc37eca17402c92a83f062b04b5883ac1cd5be49b6e5653dc8d0e6fb7127e573397ca62f518045795536912526ec4bfd9744d
-
SSDEEP
12288:AcrNS33L10QdrX6O1nbGnBoX0DWdl3oV52aA8buKO01+0SOP1HvMKhv5KVwCaU0F:jNA3R5drX31bFXOul4qr8bK04BOP1Hvb
Static task
static1
Behavioral task
behavioral1
Sample
2360bb0b42650f2feb47a0e988ccc3ea.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2360bb0b42650f2feb47a0e988ccc3ea.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://94.156.66.169:5888/shtfgdfgd/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
2360bb0b42650f2feb47a0e988ccc3ea.exe
-
Size
730KB
-
MD5
2360bb0b42650f2feb47a0e988ccc3ea
-
SHA1
0712817e7fabe68e34d67ce4151728d9f2eb8cba
-
SHA256
5156add523f08eb7eabb51f3ce648d6f93c646bec4c6cee7dd59d95e5b50b2b3
-
SHA512
d95afaa69795cfa63bed2e22f98bc37eca17402c92a83f062b04b5883ac1cd5be49b6e5653dc8d0e6fb7127e573397ca62f518045795536912526ec4bfd9744d
-
SSDEEP
12288:AcrNS33L10QdrX6O1nbGnBoX0DWdl3oV52aA8buKO01+0SOP1HvMKhv5KVwCaU0F:jNA3R5drX31bFXOul4qr8bK04BOP1Hvb
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-