General
-
Target
ee0558d98d1151d6ce6ebb419a05e6def3c758f703518648a03c03ed8d830726.exe
-
Size
527KB
-
Sample
250110-rheneaymcm
-
MD5
de71da3a473f5cdb285d30a1d6dd333b
-
SHA1
ebb3e9e7fe88c5ba0c24d0411f7a0c04c9e04181
-
SHA256
ee0558d98d1151d6ce6ebb419a05e6def3c758f703518648a03c03ed8d830726
-
SHA512
56abc310955d04ab212c8737c6b1c2ef744f4c0d623fb7e12f4fcb4c8a5d03b9c80d96f225cc022a6abc09f2ea68700e3ebfba0b281e52a0e71996c06fa62d8d
-
SSDEEP
12288:gPGqp9ou9WbaMbHkBsy6oaQRCfWksQVJZaoIsfMD:aroIWBrkPXcLXaoZMD
Static task
static1
Behavioral task
behavioral1
Sample
ee0558d98d1151d6ce6ebb419a05e6def3c758f703518648a03c03ed8d830726.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://94.156.177.41/simple/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
ee0558d98d1151d6ce6ebb419a05e6def3c758f703518648a03c03ed8d830726.exe
-
Size
527KB
-
MD5
de71da3a473f5cdb285d30a1d6dd333b
-
SHA1
ebb3e9e7fe88c5ba0c24d0411f7a0c04c9e04181
-
SHA256
ee0558d98d1151d6ce6ebb419a05e6def3c758f703518648a03c03ed8d830726
-
SHA512
56abc310955d04ab212c8737c6b1c2ef744f4c0d623fb7e12f4fcb4c8a5d03b9c80d96f225cc022a6abc09f2ea68700e3ebfba0b281e52a0e71996c06fa62d8d
-
SSDEEP
12288:gPGqp9ou9WbaMbHkBsy6oaQRCfWksQVJZaoIsfMD:aroIWBrkPXcLXaoZMD
-
Lokibot family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1