General
-
Target
ea54174b06ccb0c8ed72b377e214fec0N.exe
-
Size
607KB
-
Sample
240906-zx9fbsxgql
-
MD5
ea54174b06ccb0c8ed72b377e214fec0
-
SHA1
8fc5fba8900cc14b69dc2dd03204b411b6bdef38
-
SHA256
7be74f1dd357e35d0277aa8ec02ff0f0de3d508d503d86de2ea8f227f96266c6
-
SHA512
9fd734910e54a6110e6601e4cdf772effad3a32af44da2f79a348d8706e3d86b61c0b53f063e567995365b7cbbb2e4f023e5060d163dd5b75b72268b6ea2dae7
-
SSDEEP
12288:9n8yN0Mr825/uTPoJZD1b/kpN1n5cW5jZ:FPu2GPoJZhYHL5jZ
Static task
static1
Behavioral task
behavioral1
Sample
ea54174b06ccb0c8ed72b377e214fec0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ea54174b06ccb0c8ed72b377e214fec0N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://bobbyelectronics.xyz/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
ea54174b06ccb0c8ed72b377e214fec0N.exe
-
Size
607KB
-
MD5
ea54174b06ccb0c8ed72b377e214fec0
-
SHA1
8fc5fba8900cc14b69dc2dd03204b411b6bdef38
-
SHA256
7be74f1dd357e35d0277aa8ec02ff0f0de3d508d503d86de2ea8f227f96266c6
-
SHA512
9fd734910e54a6110e6601e4cdf772effad3a32af44da2f79a348d8706e3d86b61c0b53f063e567995365b7cbbb2e4f023e5060d163dd5b75b72268b6ea2dae7
-
SSDEEP
12288:9n8yN0Mr825/uTPoJZD1b/kpN1n5cW5jZ:FPu2GPoJZhYHL5jZ
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1