General
-
Target
ba66dd24d4e15ad89e20c99cc4fc7dbbdd429299e0edd1a36be467d98334a30a
-
Size
367KB
-
Sample
241108-t9avmsvlez
-
MD5
7a174472497dc70f725a3c99974f38be
-
SHA1
806f39d3b8d5a5e8b1d7a3f6fa28954170d108b4
-
SHA256
ba66dd24d4e15ad89e20c99cc4fc7dbbdd429299e0edd1a36be467d98334a30a
-
SHA512
51829af4c29e5045f158aafcac8ace366dcb6896dea42e2d4de3bf10a4352033ea4f498dca90b7c58cc83e851089cd6fb8e1f27baa97aba44fc0ea923c319c64
-
SSDEEP
6144:k9zwM1I8k+s7fQAqBl/Pj+0U9eSADc+szi4Iihxz31:0P1I8k+aZqB5Pj+0qABsAij5
Behavioral task
behavioral1
Sample
ba66dd24d4e15ad89e20c99cc4fc7dbbdd429299e0edd1a36be467d98334a30a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ba66dd24d4e15ad89e20c99cc4fc7dbbdd429299e0edd1a36be467d98334a30a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lokibot
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
http://164.90.194.235/?id=17007285853618101
Targets
-
-
Target
ba66dd24d4e15ad89e20c99cc4fc7dbbdd429299e0edd1a36be467d98334a30a
-
Size
367KB
-
MD5
7a174472497dc70f725a3c99974f38be
-
SHA1
806f39d3b8d5a5e8b1d7a3f6fa28954170d108b4
-
SHA256
ba66dd24d4e15ad89e20c99cc4fc7dbbdd429299e0edd1a36be467d98334a30a
-
SHA512
51829af4c29e5045f158aafcac8ace366dcb6896dea42e2d4de3bf10a4352033ea4f498dca90b7c58cc83e851089cd6fb8e1f27baa97aba44fc0ea923c319c64
-
SSDEEP
6144:k9zwM1I8k+s7fQAqBl/Pj+0U9eSADc+szi4Iihxz31:0P1I8k+aZqB5Pj+0qABsAij5
-
Detect Neshta payload
-
Lokibot family
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Accesses Microsoft Outlook profiles
-