General
-
Target
15e851a4cb9c2270b109a2a346b9ce9a8c15104825b211a4194b3113c60f8ba3.lnk
-
Size
2KB
-
Sample
240806-bnzyjaydqf
-
MD5
1d5c4d5d15b7556fe88893a7352efbf8
-
SHA1
124b6911e134fc0ef7d75293bf7736941a5b26e9
-
SHA256
15e851a4cb9c2270b109a2a346b9ce9a8c15104825b211a4194b3113c60f8ba3
-
SHA512
f678b94722a6d1b6ca4c84c6ea4ea9f116fb56d79000d646f6d1f044cd40069738809babc18972c637d4c457ba82aa1e207cebee756a05cc030e30a8b7b9b244
Static task
static1
Behavioral task
behavioral1
Sample
15e851a4cb9c2270b109a2a346b9ce9a8c15104825b211a4194b3113c60f8ba3.lnk
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
15e851a4cb9c2270b109a2a346b9ce9a8c15104825b211a4194b3113c60f8ba3.lnk
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://www.requimacofradian.site/dfjbhskdbfvsdsfgsh/bzdjgbsdzjkngdsnhgtuonidsgtsgb/neio.exe
Extracted
lokibot
http://94.156.66.169:5788/bhvstgd/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
15e851a4cb9c2270b109a2a346b9ce9a8c15104825b211a4194b3113c60f8ba3.lnk
-
Size
2KB
-
MD5
1d5c4d5d15b7556fe88893a7352efbf8
-
SHA1
124b6911e134fc0ef7d75293bf7736941a5b26e9
-
SHA256
15e851a4cb9c2270b109a2a346b9ce9a8c15104825b211a4194b3113c60f8ba3
-
SHA512
f678b94722a6d1b6ca4c84c6ea4ea9f116fb56d79000d646f6d1f044cd40069738809babc18972c637d4c457ba82aa1e207cebee756a05cc030e30a8b7b9b244
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-