General
-
Target
MalwareBazaar.3
-
Size
2KB
-
Sample
240806-zx1hesthkh
-
MD5
8d2464bee26f6e3d7c43953cfb3eebae
-
SHA1
906f5952737b7b6f15abaaaca1a4c22111d39338
-
SHA256
49b2caa0106ae7c87c555dfc3a919f2c1c4f1074e605b4c220fe3c85e7d2052e
-
SHA512
5e75b583648ddfe7f34da44d2d4188cd9663e51b5a6f773539d43cf0269ca511a5fd7e922ade8438ea3f7ec5ce6f48cdbd7b2a3cdcdff43fe78ccd61dee7e53e
Static task
static1
Behavioral task
behavioral1
Sample
MalwareBazaar.lnk
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
MalwareBazaar.lnk
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://www.requimacofradian.site/dfjbhskdbfvsdsfgsh/bzdjgbsdzjkngdsnhgtuonidsgtsgb/neio.exe
Extracted
lokibot
http://94.156.66.169:5788/bhvstgd/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
MalwareBazaar.3
-
Size
2KB
-
MD5
8d2464bee26f6e3d7c43953cfb3eebae
-
SHA1
906f5952737b7b6f15abaaaca1a4c22111d39338
-
SHA256
49b2caa0106ae7c87c555dfc3a919f2c1c4f1074e605b4c220fe3c85e7d2052e
-
SHA512
5e75b583648ddfe7f34da44d2d4188cd9663e51b5a6f773539d43cf0269ca511a5fd7e922ade8438ea3f7ec5ce6f48cdbd7b2a3cdcdff43fe78ccd61dee7e53e
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-