General
-
Target
logicalwayofgreatthingswhichcreatedwithgreatwayofgood.hta
-
Size
130KB
-
Sample
241023-gqwxjsvanh
-
MD5
16e67de00d1302e9720892be8ab6a06c
-
SHA1
8e8ee3df01c4fb6efd9a5289f48b9795c2483063
-
SHA256
4145c6882b855cfbe79cbe9f9359260d503b0733ef6c901a9f62dd273568e662
-
SHA512
fe6d68bc44f8b2243e1f02e77bf4c39c1ddfe4b2c0ccbf2051da7d10641d06b1da5756e1e89806c09cdad06ea9ca4074a18e98416ece919dbdda55e530a19b0a
-
SSDEEP
96:Eam7B6DJU946WJU92EYDF/9MM9/y80636sJU956t7T:Ea2wDJGWJtEYpJqsJtRT
Static task
static1
Behavioral task
behavioral1
Sample
logicalwayofgreatthingswhichcreatedwithgreatwayofgood.hta
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
logicalwayofgreatthingswhichcreatedwithgreatwayofgood.hta
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Extracted
lokibot
http://94.156.177.220/logs/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
logicalwayofgreatthingswhichcreatedwithgreatwayofgood.hta
-
Size
130KB
-
MD5
16e67de00d1302e9720892be8ab6a06c
-
SHA1
8e8ee3df01c4fb6efd9a5289f48b9795c2483063
-
SHA256
4145c6882b855cfbe79cbe9f9359260d503b0733ef6c901a9f62dd273568e662
-
SHA512
fe6d68bc44f8b2243e1f02e77bf4c39c1ddfe4b2c0ccbf2051da7d10641d06b1da5756e1e89806c09cdad06ea9ca4074a18e98416ece919dbdda55e530a19b0a
-
SSDEEP
96:Eam7B6DJU946WJU92EYDF/9MM9/y80636sJU956t7T:Ea2wDJGWJtEYpJqsJtRT
-
Blocklisted process makes network request
-
Evasion via Device Credential Deployment
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-