General
-
Target
324107534c778f2322006af7a6a98d4cbff672238fe8c83dcc9582210109720b.exe
-
Size
553KB
-
Sample
240810-bj4e6asfka
-
MD5
4a987c5ac3651d23ff59f02b0a9892df
-
SHA1
7077a00688b6e4ccdf5a562c3064cd11181e73c1
-
SHA256
324107534c778f2322006af7a6a98d4cbff672238fe8c83dcc9582210109720b
-
SHA512
6272073ab0799b2fd09c661036c21e2c80871fe65f464609dd18c181c4601621e14a9dfccec03e1b3d66c5c22bb9bdd345ee7586fbb6b55044ec6252a3461a27
-
SSDEEP
12288:j8NN0Wq55+SQGKuWtZGVbKKgBr5IrS4G2H8F0/DzEkR:Q8/5+BdtcK9VIrSacEvj
Static task
static1
Behavioral task
behavioral1
Sample
324107534c778f2322006af7a6a98d4cbff672238fe8c83dcc9582210109720b.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
324107534c778f2322006af7a6a98d4cbff672238fe8c83dcc9582210109720b.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://104.248.205.66/index.php/wp?s=831
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
324107534c778f2322006af7a6a98d4cbff672238fe8c83dcc9582210109720b.exe
-
Size
553KB
-
MD5
4a987c5ac3651d23ff59f02b0a9892df
-
SHA1
7077a00688b6e4ccdf5a562c3064cd11181e73c1
-
SHA256
324107534c778f2322006af7a6a98d4cbff672238fe8c83dcc9582210109720b
-
SHA512
6272073ab0799b2fd09c661036c21e2c80871fe65f464609dd18c181c4601621e14a9dfccec03e1b3d66c5c22bb9bdd345ee7586fbb6b55044ec6252a3461a27
-
SSDEEP
12288:j8NN0Wq55+SQGKuWtZGVbKKgBr5IrS4G2H8F0/DzEkR:Q8/5+BdtcK9VIrSacEvj
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-