General
-
Target
greatwayforbestthignswithwhonotwanttodo.hta
-
Size
130KB
-
Sample
241023-gqw8baweql
-
MD5
67a5ad5e7caf5c79cb209e433c345c0b
-
SHA1
15776cf58dee4ecb7b42b2836539d8d553bf5439
-
SHA256
5d06cbde318e42ef7e39a6af52d96576aec4f11477101e4c90718f12c09c5eb4
-
SHA512
b6b697d11dca698441116526bad13c366ba78b477b7489372fff4155a3a06fc49a6487cf2e7a6e33855b7ac7c57dc0c99760a6fe54e77f2b2ec51539a6f5ee96
-
SSDEEP
192:Ea2xJKbBKWvKbBRWGWiJnKbBxKbBDWNTKbBUT:UWSHWi0yW22
Static task
static1
Behavioral task
behavioral1
Sample
greatwayforbestthignswithwhonotwanttodo.hta
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
greatwayforbestthignswithwhonotwanttodo.hta
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Extracted
lokibot
http://94.156.177.220/simple/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
greatwayforbestthignswithwhonotwanttodo.hta
-
Size
130KB
-
MD5
67a5ad5e7caf5c79cb209e433c345c0b
-
SHA1
15776cf58dee4ecb7b42b2836539d8d553bf5439
-
SHA256
5d06cbde318e42ef7e39a6af52d96576aec4f11477101e4c90718f12c09c5eb4
-
SHA512
b6b697d11dca698441116526bad13c366ba78b477b7489372fff4155a3a06fc49a6487cf2e7a6e33855b7ac7c57dc0c99760a6fe54e77f2b2ec51539a6f5ee96
-
SSDEEP
192:Ea2xJKbBKWvKbBRWGWiJnKbBxKbBDWNTKbBUT:UWSHWi0yW22
-
Blocklisted process makes network request
-
Evasion via Device Credential Deployment
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-