General
-
Target
5a289141e67254662e3de8153a65fba0N.exe
-
Size
510KB
-
Sample
240906-lthxbazbmn
-
MD5
5a289141e67254662e3de8153a65fba0
-
SHA1
4b7b5d2fd67df990bde1006f359d8f630cd97781
-
SHA256
74f7256023d3638272f7eb34e10eb16aa08da56c818f2c296eb37b49dc8d7641
-
SHA512
99ca558b34f1702c9addba9057dd4cd86258f26e3716812cbfe4e25217e3df5e9fcf98674d61a34cd9d6903489d41a34b0375d2fabb64bff2d340fbbddbb5b9a
-
SSDEEP
6144:t01IhC1ZueHrCqZFCoM7q47sdy1f6NJDQzbTOjHm7Af7OMgpx11H4/5dofKx/8GP:t0bfHLC9f56mym7ZZjPHKo+esTCmW+8
Behavioral task
behavioral1
Sample
5a289141e67254662e3de8153a65fba0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5a289141e67254662e3de8153a65fba0N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://sbrglobal.net/looms/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
5a289141e67254662e3de8153a65fba0N.exe
-
Size
510KB
-
MD5
5a289141e67254662e3de8153a65fba0
-
SHA1
4b7b5d2fd67df990bde1006f359d8f630cd97781
-
SHA256
74f7256023d3638272f7eb34e10eb16aa08da56c818f2c296eb37b49dc8d7641
-
SHA512
99ca558b34f1702c9addba9057dd4cd86258f26e3716812cbfe4e25217e3df5e9fcf98674d61a34cd9d6903489d41a34b0375d2fabb64bff2d340fbbddbb5b9a
-
SSDEEP
6144:t01IhC1ZueHrCqZFCoM7q47sdy1f6NJDQzbTOjHm7Af7OMgpx11H4/5dofKx/8GP:t0bfHLC9f56mym7ZZjPHKo+esTCmW+8
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1