General
-
Target
Awb#7758797443.exe
-
Size
545KB
-
Sample
240830-lwvnwsxhmh
-
MD5
f534eca6bca33bf5865003b0ee44fed3
-
SHA1
3c82af992b1bbfe27e63e80fbaf9ae5a7fb2e2b0
-
SHA256
589026de83790db3912fbb7c0e8b2da67d24503452a5c20c001e24c4950bd9db
-
SHA512
4aed724ef00804d6b35e9706dd1b454879c45400ffe193f0c9c2b0d6020c508ed02c468edf48b3accbeb6b442366093a6105ea51cf1e0aa6cbf895d8bab18270
-
SSDEEP
12288:VVVkSNuUDYgGsJ+OlUIsNbpPPvxmf8tEKz7JYkR:BkCuUDYMJ1+IQPhaoP
Static task
static1
Behavioral task
behavioral1
Sample
Awb#7758797443.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Awb#7758797443.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://104.248.205.66/index.php/pages?id=281164463123697
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Awb#7758797443.exe
-
Size
545KB
-
MD5
f534eca6bca33bf5865003b0ee44fed3
-
SHA1
3c82af992b1bbfe27e63e80fbaf9ae5a7fb2e2b0
-
SHA256
589026de83790db3912fbb7c0e8b2da67d24503452a5c20c001e24c4950bd9db
-
SHA512
4aed724ef00804d6b35e9706dd1b454879c45400ffe193f0c9c2b0d6020c508ed02c468edf48b3accbeb6b442366093a6105ea51cf1e0aa6cbf895d8bab18270
-
SSDEEP
12288:VVVkSNuUDYgGsJ+OlUIsNbpPPvxmf8tEKz7JYkR:BkCuUDYMJ1+IQPhaoP
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1