General
-
Target
27112024_1037_26112024_Transferencia.gz
-
Size
1KB
-
Sample
241127-mxgzvsxjgj
-
MD5
aee1a042940ffb03651607b5e26e2f8b
-
SHA1
c49bde96b5e5125409c2011fbe0895959046b4f5
-
SHA256
eb2170acecff6ba21826cb400b90122f5a88c0086921f927eaa2b8b29fdf8f1f
-
SHA512
802a42fc45fe9c6b683f48f47a2f34c9b88376b42297752acfd0f80f45c4b5a65dcd06d28665c1281d69c83a5b34114c08197d2bbaed73c6a6054c091659ee00
Static task
static1
Behavioral task
behavioral1
Sample
Transferencia.pdf.lnk
Resource
win7-20241023-en
Malware Config
Extracted
https://www.sodiumlaurethsulfatedesyroyer.com/tdtyhrxf/dfhsrarytrsagerfwearfwerfwerthdyttyfuiuoifjcghhbg/uhihtrgeytgefghdhjsdxghshnytrghdhfghsgb/sdfgdsh.exe
Extracted
lokibot
http://naturealmikaly.sytes.net:5338/sujfygidj/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Transferencia.pdf.lnk.lnk
-
Size
2KB
-
MD5
f979b032e2ff9982eb392528641b634c
-
SHA1
47a8320cfa87be712554d29b9ad7ad83fee04370
-
SHA256
5dc14e2aeea05c75894a451c65b43ddc7eb8c70c62ec4da968a2aeccdb52450c
-
SHA512
3891b3b796c8b8ea5d1824a5cce9ec2201bd1ed61d1fbd8d0d561b4da51fab1cd2d865684fe2787ad1385ea529da376f083007059859206282ccbb3cf5ea9825
-
Lokibot family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-