General
-
Target
a07e0d590556c445729aed78b74913c83e4ccf5080fbead8cf2aded8fd166e5b
-
Size
313KB
-
Sample
240903-xq9reatgnr
-
MD5
e3cd05c470abe18ecfc77b93c49220b8
-
SHA1
9f37a4a49424d21fd56d3638b16dba2c241e06d7
-
SHA256
a07e0d590556c445729aed78b74913c83e4ccf5080fbead8cf2aded8fd166e5b
-
SHA512
5e54271782f4c0af30b445897a38a14b35cc08462944b87649b72354b95e5411e1c6db4eb59df5a3d3d368c752600573c0fc10082811fe9f5cd6e70fdb7bd4d8
-
SSDEEP
6144:OhjpHgxz03pf8MyB53mXMhAPVIOven5B1HP0laB6OyvZ76XgrEigk++qgKm0fG4h:OOtwMaegene8V676wwBkTt0+4h
Static task
static1
Behavioral task
behavioral1
Sample
e6dd5a2bbbaec7c7cc5d6c68070ceacacd7d364806bbe31dd365cf161a61d3c0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e6dd5a2bbbaec7c7cc5d6c68070ceacacd7d364806bbe31dd365cf161a61d3c0.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://checkvim.com/ga12/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
e6dd5a2bbbaec7c7cc5d6c68070ceacacd7d364806bbe31dd365cf161a61d3c0
-
Size
376KB
-
MD5
ef6feee9c72a7d0ed5e065631faf3b36
-
SHA1
7be1eb3872891aab4d513ff6725da77609b8e95b
-
SHA256
e6dd5a2bbbaec7c7cc5d6c68070ceacacd7d364806bbe31dd365cf161a61d3c0
-
SHA512
c01c707c4b46b5b4fad41ff9af09448a671c8540f9879e750af46c22cd10ee1e3356cb855b19153048ee836467c8484239f0eadf463cd758255920e318da3d8a
-
SSDEEP
6144:q1nIWAkzEm1owGNmxNslavrY3bi948ipyZRr6EgS4DbXhiTaF9dCJL9mERt9RGTM:6IWAkTGNmxNkMY0iAR2TvDyL9pD3
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-