General
-
Target
Payment23092024.hta
-
Size
7KB
-
Sample
240924-rtj29ssdle
-
MD5
ccd0e2738d0e4b7a59a358232d8a9044
-
SHA1
1cb60d8d1ba530815f233fc28d809bf884f8b4d0
-
SHA256
d52690951ad1a5dd386f8157684af0ce56cf54cb0d6ad936c6735371752cb4d2
-
SHA512
bedcc4a2dbaeea2f222216ad8496ec2eedc4d938f7050bf127c596d4e908974dfb8b5f81ad30e125a713cb702b0723e04dfa28486d71b042b2a325efde595541
-
SSDEEP
96:bWvaFjbF7xDH6afMy0J+U7AH/wKbSgXd6JHP+bow2GHOnVWtV3UcCzswQ8NhVeJz:+cbFdbEhAH/lf6JL3VWz38zp7Uz
Static task
static1
Behavioral task
behavioral1
Sample
Payment23092024.hta
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Payment23092024.hta
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
https://trvtest.click/RF/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Payment23092024.hta
-
Size
7KB
-
MD5
ccd0e2738d0e4b7a59a358232d8a9044
-
SHA1
1cb60d8d1ba530815f233fc28d809bf884f8b4d0
-
SHA256
d52690951ad1a5dd386f8157684af0ce56cf54cb0d6ad936c6735371752cb4d2
-
SHA512
bedcc4a2dbaeea2f222216ad8496ec2eedc4d938f7050bf127c596d4e908974dfb8b5f81ad30e125a713cb702b0723e04dfa28486d71b042b2a325efde595541
-
SSDEEP
96:bWvaFjbF7xDH6afMy0J+U7AH/wKbSgXd6JHP+bow2GHOnVWtV3UcCzswQ8NhVeJz:+cbFdbEhAH/lf6JL3VWz38zp7Uz
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-