General
-
Target
08591ed45402ad065bab1aaf06a05a2d7c9264695b00299f5059ebaf26584a59.exe
-
Size
555KB
-
Sample
241031-cf6a1sxclm
-
MD5
4184c85c39e0309f6e841530b9b08a2a
-
SHA1
44034fffb3079ede732ccb37af9a737637c90ac6
-
SHA256
08591ed45402ad065bab1aaf06a05a2d7c9264695b00299f5059ebaf26584a59
-
SHA512
28015d2212af15084a664535a1783d0f26c249a4e465bd338ee64b7e9ea822effc9629a941c500ac16052ddb1d1b92ae658e1f8375d1df9319ba4ce2c3c85cc5
-
SSDEEP
12288:ZfaDPw1Qk89TmyP0KKWIogkr9ck/q84fJqMxMTYRb6W7Ly8Sunx3M8AgjEJWy:ZSLw9gTFP3gm99/v4BqyGW7S2Gt
Static task
static1
Behavioral task
behavioral1
Sample
08591ed45402ad065bab1aaf06a05a2d7c9264695b00299f5059ebaf26584a59.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://touxzw.ir/alpha2/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
08591ed45402ad065bab1aaf06a05a2d7c9264695b00299f5059ebaf26584a59.exe
-
Size
555KB
-
MD5
4184c85c39e0309f6e841530b9b08a2a
-
SHA1
44034fffb3079ede732ccb37af9a737637c90ac6
-
SHA256
08591ed45402ad065bab1aaf06a05a2d7c9264695b00299f5059ebaf26584a59
-
SHA512
28015d2212af15084a664535a1783d0f26c249a4e465bd338ee64b7e9ea822effc9629a941c500ac16052ddb1d1b92ae658e1f8375d1df9319ba4ce2c3c85cc5
-
SSDEEP
12288:ZfaDPw1Qk89TmyP0KKWIogkr9ck/q84fJqMxMTYRb6W7Ly8Sunx3M8AgjEJWy:ZSLw9gTFP3gm99/v4BqyGW7S2Gt
-
Lokibot family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-