General
-
Target
Comprobante.lnk.lnk
-
Size
2KB
-
Sample
241003-h2mzfs1cpn
-
MD5
b234c46d1f63b18ad2dc3f824bc0d6fa
-
SHA1
fbdcce6b33b9e0ffbba48aadca0db9059af37141
-
SHA256
8cd7bd86c1cc1be6d0c553fc3e8e02232b70363fadc3212989b1599a70c668d3
-
SHA512
883b59b949966ac9a4b04f51a5298f842b94c80423dec3dd35105c4c61724cde142b7a781a8fab9da32c6748e4d205af7c74f1acd09388f5d19600ac8da97883
Static task
static1
Behavioral task
behavioral1
Sample
Comprobante.lnk
Resource
win7-20240708-en
Malware Config
Extracted
https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif
Extracted
lokibot
http://freighteighttwocam.ddns.net/mdifygidj/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Comprobante.lnk.lnk
-
Size
2KB
-
MD5
b234c46d1f63b18ad2dc3f824bc0d6fa
-
SHA1
fbdcce6b33b9e0ffbba48aadca0db9059af37141
-
SHA256
8cd7bd86c1cc1be6d0c553fc3e8e02232b70363fadc3212989b1599a70c668d3
-
SHA512
883b59b949966ac9a4b04f51a5298f842b94c80423dec3dd35105c4c61724cde142b7a781a8fab9da32c6748e4d205af7c74f1acd09388f5d19600ac8da97883
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-