General
-
Target
creatednewthingsformee.hta
-
Size
205KB
-
Sample
241030-k8621szgkc
-
MD5
0b94188f0fe1baed9f97e0a69806b6e9
-
SHA1
65a871c11c36799a747b8b40154130415f6e6f84
-
SHA256
5775dd79d6529e77182ceccb5f0a1d9d22d4884017df41dade409caf6471e48f
-
SHA512
ad87371d82d5887377cc5882111f26849c6783427bf15c2fe235ca7570898d8937032e445e377acfe6d495ba01a0cad558fd0a3ecb23152b177ef5708639b75a
-
SSDEEP
96:43F975adf4WbLdfSWbmx0JnfXdfmdfvUWbEdfAQ:43F15Of4GRfSGmx0J1fqfvUGAfAQ
Static task
static1
Behavioral task
behavioral1
Sample
creatednewthingsformee.hta
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
creatednewthingsformee.hta
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Extracted
lokibot
http://94.156.177.220/simple/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
creatednewthingsformee.hta
-
Size
205KB
-
MD5
0b94188f0fe1baed9f97e0a69806b6e9
-
SHA1
65a871c11c36799a747b8b40154130415f6e6f84
-
SHA256
5775dd79d6529e77182ceccb5f0a1d9d22d4884017df41dade409caf6471e48f
-
SHA512
ad87371d82d5887377cc5882111f26849c6783427bf15c2fe235ca7570898d8937032e445e377acfe6d495ba01a0cad558fd0a3ecb23152b177ef5708639b75a
-
SSDEEP
96:43F975adf4WbLdfSWbmx0JnfXdfmdfvUWbEdfAQ:43F15Of4GRfSGmx0J1fqfvUGAfAQ
-
Lokibot family
-
Blocklisted process makes network request
-
Evasion via Device Credential Deployment
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-