General
-
Target
759dd13715bc424308f1d0032ac4b502.exe
-
Size
506KB
-
Sample
241119-lnrl9symgk
-
MD5
759dd13715bc424308f1d0032ac4b502
-
SHA1
03347c96c50c140192e8df70260d732bea301ebc
-
SHA256
d4c86776bcf1dc4ffd2f51538f3e342216314b76cdba2c2864193350654a9aca
-
SHA512
4197992f4b44ea45c91cb00c7308949560ae24d179e9a14ebc4efb27e1b20abae203b1c8756c211eb9aab9732a3fd04c824bd6bc92510c8de3caea3a8cfa8e55
-
SSDEEP
12288:5Qoo7mJW/tmZtHkO43UhcmxPHq4eOnW3Gtl9yZyfXdfd:5zo7mEVmZtHk+cCPqRWtl9KeNfd
Static task
static1
Behavioral task
behavioral1
Sample
759dd13715bc424308f1d0032ac4b502.exe
Resource
win7-20240708-en
Malware Config
Extracted
lokibot
http://94.156.177.41/maxzi/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
759dd13715bc424308f1d0032ac4b502.exe
-
Size
506KB
-
MD5
759dd13715bc424308f1d0032ac4b502
-
SHA1
03347c96c50c140192e8df70260d732bea301ebc
-
SHA256
d4c86776bcf1dc4ffd2f51538f3e342216314b76cdba2c2864193350654a9aca
-
SHA512
4197992f4b44ea45c91cb00c7308949560ae24d179e9a14ebc4efb27e1b20abae203b1c8756c211eb9aab9732a3fd04c824bd6bc92510c8de3caea3a8cfa8e55
-
SSDEEP
12288:5Qoo7mJW/tmZtHkO43UhcmxPHq4eOnW3Gtl9yZyfXdfd:5zo7mEVmZtHk+cCPqRWtl9KeNfd
-
Lokibot family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-