General
-
Target
C0R560768T88540873.eml
-
Size
625KB
-
Sample
240909-rvcdtavgjg
-
MD5
8e4449199d7e3eee770bdeb277c89654
-
SHA1
877a9d89ed73f86be7e63bd951158589de52ff9f
-
SHA256
fcdf474f59fd7fac5cca8f82160578b99689e2234014701054c15e4eaa8e8bb5
-
SHA512
93fd3ccd818e727c6ebe742ab09401908f805328fa402c4e8a40edff0b9f28e24004cb9f14c809ea5ffdf6c71a266ef48d671f5c16da20ff85ab1d93bfdfcbe5
-
SSDEEP
12288:XTLqcJdMRNLe49j+DsS9/HpuiBOdHEKpy//85F021H7x2:X/O7+4SlpdAdEM7U
Static task
static1
Behavioral task
behavioral1
Sample
NMB Transaction Advice Slip.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
NMB Transaction Advice Slip.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://104.248.205.66/index.php/pages?id=281164463123697
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
NMB Transaction Advice Slip.exe
-
Size
517KB
-
MD5
9e441defd7d4ab7e0245ee8a26498deb
-
SHA1
33da2fbc93355088674e6090ced0fb128476c9c4
-
SHA256
b145eca67fb85417b21ebc5c779953b0797c62c6b2c01a067f779ba0225d2ae5
-
SHA512
8a5168eed2725ddd3773c690be4b1576eaec8565623b15da08c67f747c46cdbf98b38306ee152a58de6cbca3bd051080bf56d9e34cf974ef5448df0a1dd6f1b6
-
SSDEEP
12288:SNxzRKAStqueqGQo/cN9NGxtm3J6Zw49i72lUFkR:MF+qfPQQcQxtm3kw4kE7
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1