General
-
Target
ddb5e23628ee7ec31f19fd22b9183896d27f5dca982a9e68a189dd32c3fc42b0
-
Size
631KB
-
Sample
250117-kmx7zsznaj
-
MD5
34453017763cd28119be45767713eb08
-
SHA1
7e4312d2659819b914b2945c52f9e7a144c2a177
-
SHA256
ddb5e23628ee7ec31f19fd22b9183896d27f5dca982a9e68a189dd32c3fc42b0
-
SHA512
34e3479a4a43bb692f9ad705312bceec15376f078a5543a94001599f8e445118844e7111c4b37bd3fab59c9bb36c3c244df0efcb798e3263f67f2e1df3445eba
-
SSDEEP
12288:vbt9loJNhQ/cWS7stXlQscP1vt7CMTGhY2OizRilLzaxT4Z:7iJN+UVsIsy1tS1slqxT4
Static task
static1
Behavioral task
behavioral1
Sample
ddb5e23628ee7ec31f19fd22b9183896d27f5dca982a9e68a189dd32c3fc42b0.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://94.156.177.41/alpha/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
ddb5e23628ee7ec31f19fd22b9183896d27f5dca982a9e68a189dd32c3fc42b0
-
Size
631KB
-
MD5
34453017763cd28119be45767713eb08
-
SHA1
7e4312d2659819b914b2945c52f9e7a144c2a177
-
SHA256
ddb5e23628ee7ec31f19fd22b9183896d27f5dca982a9e68a189dd32c3fc42b0
-
SHA512
34e3479a4a43bb692f9ad705312bceec15376f078a5543a94001599f8e445118844e7111c4b37bd3fab59c9bb36c3c244df0efcb798e3263f67f2e1df3445eba
-
SSDEEP
12288:vbt9loJNhQ/cWS7stXlQscP1vt7CMTGhY2OizRilLzaxT4Z:7iJN+UVsIsy1tS1slqxT4
-
Lokibot family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-