General
-
Target
d45774e35bae6212c05c958ec5e677e4741e0ef2c12f0c108930dff977fd4948N
-
Size
595KB
-
Sample
240919-wq337asdme
-
MD5
c24d6fc700d1ad520fbb2989d7ed10c0
-
SHA1
53bbff3444af9279bd93437aea774044512e54cb
-
SHA256
d45774e35bae6212c05c958ec5e677e4741e0ef2c12f0c108930dff977fd4948
-
SHA512
839a8697e0595e411832fec9e86cb02c4b61ef35ac7e06646938731cb9bbf513dcb0a3f7a5566078c69c234be3289a43c70d1d13771e4d3b89155248a575601f
-
SSDEEP
12288:xPv61UoIG5MPUlqDu2W3hNPFdTjVn5IjuE1P33gI3bpKK:ZCUobyAN2GhNPvTjV5IjuE1v3gI3f
Static task
static1
Behavioral task
behavioral1
Sample
d45774e35bae6212c05c958ec5e677e4741e0ef2c12f0c108930dff977fd4948N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d45774e35bae6212c05c958ec5e677e4741e0ef2c12f0c108930dff977fd4948N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://104.248.205.66/index.php/modify.php?edit=1
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d45774e35bae6212c05c958ec5e677e4741e0ef2c12f0c108930dff977fd4948N
-
Size
595KB
-
MD5
c24d6fc700d1ad520fbb2989d7ed10c0
-
SHA1
53bbff3444af9279bd93437aea774044512e54cb
-
SHA256
d45774e35bae6212c05c958ec5e677e4741e0ef2c12f0c108930dff977fd4948
-
SHA512
839a8697e0595e411832fec9e86cb02c4b61ef35ac7e06646938731cb9bbf513dcb0a3f7a5566078c69c234be3289a43c70d1d13771e4d3b89155248a575601f
-
SSDEEP
12288:xPv61UoIG5MPUlqDu2W3hNPFdTjVn5IjuE1P33gI3bpKK:ZCUobyAN2GhNPvTjV5IjuE1v3gI3f
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-