General
-
Target
nicelookgirlfrinedonmyheartshegoodforbestthignstodoforme.hta
-
Size
131KB
-
Sample
241029-pf13hstqcy
-
MD5
07a93908c3113536577c9c5b734a0af0
-
SHA1
794af14ec431e796ca6b61ed2094f623b86d77a9
-
SHA256
809e92422295976379070a5f2bb56313ca401b52d78b5d78134a08fcfd781202
-
SHA512
34ef8170d518afbf42bc16a0759f3609153338e6e4bbc1ce05e94933e13ce4f6c1c8f5de7aedfe5f675311f593d5cbe377908815922d55a076eaa7c35493ba79
-
SSDEEP
96:4vCt72QeBoCn7iY1opReQiY7ERPI/T5eodWQ:4vCF2QeaCmsoMY7MnAWQ
Static task
static1
Behavioral task
behavioral1
Sample
nicelookgirlfrinedonmyheartshegoodforbestthignstodoforme.hta
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
nicelookgirlfrinedonmyheartshegoodforbestthignstodoforme.hta
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Extracted
lokibot
http://94.156.177.220/simple/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
nicelookgirlfrinedonmyheartshegoodforbestthignstodoforme.hta
-
Size
131KB
-
MD5
07a93908c3113536577c9c5b734a0af0
-
SHA1
794af14ec431e796ca6b61ed2094f623b86d77a9
-
SHA256
809e92422295976379070a5f2bb56313ca401b52d78b5d78134a08fcfd781202
-
SHA512
34ef8170d518afbf42bc16a0759f3609153338e6e4bbc1ce05e94933e13ce4f6c1c8f5de7aedfe5f675311f593d5cbe377908815922d55a076eaa7c35493ba79
-
SSDEEP
96:4vCt72QeBoCn7iY1opReQiY7ERPI/T5eodWQ:4vCF2QeaCmsoMY7MnAWQ
-
Lokibot family
-
Blocklisted process makes network request
-
Evasion via Device Credential Deployment
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-