General
-
Target
Potvrda.cmd
-
Size
646KB
-
Sample
240820-m5srbsxgra
-
MD5
d99da007ef029c7095f13fa6afb4354b
-
SHA1
861a6fe8b6700939140e01d8942f49e5910f6b23
-
SHA256
5a83612951037202043aca608915706396f3253433393ec0589999b1ccd16acd
-
SHA512
2eb29eaffefe37893a515f80fc5cd8688fa7e02057ecc7029073aaf278f071f4f0752cb5a0848222a2002559d24edf7f1b675c90a4d12d3717935f5cdcc14ba2
-
SSDEEP
12288:LaHiMd6OdKEari+FjzES4Do/leUvE+gEI7veLGxSSxtkR:WHH6h1O2XES4sMp+5I76ISSy
Static task
static1
Behavioral task
behavioral1
Sample
Potvrda.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Potvrda.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Potvrda.exe
Resource
win11-20240802-en
Malware Config
Extracted
lokibot
http://104.248.205.66/index.php/modify?file=1
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Potvrda.cmd
-
Size
646KB
-
MD5
d99da007ef029c7095f13fa6afb4354b
-
SHA1
861a6fe8b6700939140e01d8942f49e5910f6b23
-
SHA256
5a83612951037202043aca608915706396f3253433393ec0589999b1ccd16acd
-
SHA512
2eb29eaffefe37893a515f80fc5cd8688fa7e02057ecc7029073aaf278f071f4f0752cb5a0848222a2002559d24edf7f1b675c90a4d12d3717935f5cdcc14ba2
-
SSDEEP
12288:LaHiMd6OdKEari+FjzES4Do/leUvE+gEI7veLGxSSxtkR:WHH6h1O2XES4sMp+5I76ISSy
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-