General
-
Target
Comprobante.lnk.lnk
-
Size
2KB
-
Sample
241003-h2mzfsvckh
-
MD5
8c19af87f9129a49e35158f93815eb7f
-
SHA1
9a6c4b22c2e5bf7f039eb2ad20d0822c0e913d14
-
SHA256
245f1f3463841248c78c4917dc1a846419f92d957132fabf0b4ee4501dcb6198
-
SHA512
829aa9dea154d1ac2493bee30b32fc518f0c6a595b806aefd13652591424acf885135da1eafbb1641a40fa6d84761229ea54c45bfefa7bf3f300461043f558df
Static task
static1
Behavioral task
behavioral1
Sample
Comprobante.lnk
Resource
win7-20240903-en
Malware Config
Extracted
https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif
Extracted
lokibot
http://freighteighttwocam.ddns.net/mdifygidj/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Comprobante.lnk.lnk
-
Size
2KB
-
MD5
8c19af87f9129a49e35158f93815eb7f
-
SHA1
9a6c4b22c2e5bf7f039eb2ad20d0822c0e913d14
-
SHA256
245f1f3463841248c78c4917dc1a846419f92d957132fabf0b4ee4501dcb6198
-
SHA512
829aa9dea154d1ac2493bee30b32fc518f0c6a595b806aefd13652591424acf885135da1eafbb1641a40fa6d84761229ea54c45bfefa7bf3f300461043f558df
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-