General
-
Target
C27BF6DB51F64901BA56CF64003CABD2.exe
-
Size
733KB
-
Sample
241208-jptf5ssmfq
-
MD5
c27bf6db51f64901ba56cf64003cabd2
-
SHA1
005e61ccfa9a0840d788bcff2a95cff7ec88d6db
-
SHA256
3439eaffe1dfd634b46a29ee7f0e938b5b05f9c784123a70b94f9f46aa370381
-
SHA512
1b3b19272c1d0ae7be07b4be04fbcc58e46b9fedeb31a4292bd3e8a270a2deee22efdd9891a26e708ac5d987b6996cefdac64665a685f52cbfcd54e66eb1d443
-
SSDEEP
12288:WcrNS33L10QdrX2mVnCGoe0cZKqMEF0JCEharfH0uceMTLlW44UdLZeZ:FNA3R5drXbVCGoRcZDMEwC9UucrjLc
Static task
static1
Behavioral task
behavioral1
Sample
C27BF6DB51F64901BA56CF64003CABD2.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
https://www.stipamana.com/dftjedrshyyj/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
C27BF6DB51F64901BA56CF64003CABD2.exe
-
Size
733KB
-
MD5
c27bf6db51f64901ba56cf64003cabd2
-
SHA1
005e61ccfa9a0840d788bcff2a95cff7ec88d6db
-
SHA256
3439eaffe1dfd634b46a29ee7f0e938b5b05f9c784123a70b94f9f46aa370381
-
SHA512
1b3b19272c1d0ae7be07b4be04fbcc58e46b9fedeb31a4292bd3e8a270a2deee22efdd9891a26e708ac5d987b6996cefdac64665a685f52cbfcd54e66eb1d443
-
SSDEEP
12288:WcrNS33L10QdrX2mVnCGoe0cZKqMEF0JCEharfH0uceMTLlW44UdLZeZ:FNA3R5drXbVCGoRcZDMEwC9UucrjLc
-
Lokibot family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-