General
-
Target
9581f51fb4bb7ab9258a1671e8f66513d7633c8ac9fbc867ea2d3735fa29c54b.exe
-
Size
368KB
-
Sample
250122-jtpzhswrbk
-
MD5
8b4b3d539eece4c9f37c3d73cc5ac84f
-
SHA1
c5f33f9298ae07b4fc7235ce3f4f37773cbe18cf
-
SHA256
9581f51fb4bb7ab9258a1671e8f66513d7633c8ac9fbc867ea2d3735fa29c54b
-
SHA512
6307c4cce376fb4166de2c365a7f2ba0cd239729cb7728d0bcd48e592e5f139970710be96452d5b15b4934ac43e86b1e50e20e57b91af02dd23a5716c9aac98d
-
SSDEEP
6144:wRaTX4VX/Ufjmj5QRG0HgXYityY9FmLxz:eW4VMz5HdityU0z
Static task
static1
Behavioral task
behavioral1
Sample
9581f51fb4bb7ab9258a1671e8f66513d7633c8ac9fbc867ea2d3735fa29c54b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9581f51fb4bb7ab9258a1671e8f66513d7633c8ac9fbc867ea2d3735fa29c54b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lokibot
http://itjskjban.gq/too/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
9581f51fb4bb7ab9258a1671e8f66513d7633c8ac9fbc867ea2d3735fa29c54b.exe
-
Size
368KB
-
MD5
8b4b3d539eece4c9f37c3d73cc5ac84f
-
SHA1
c5f33f9298ae07b4fc7235ce3f4f37773cbe18cf
-
SHA256
9581f51fb4bb7ab9258a1671e8f66513d7633c8ac9fbc867ea2d3735fa29c54b
-
SHA512
6307c4cce376fb4166de2c365a7f2ba0cd239729cb7728d0bcd48e592e5f139970710be96452d5b15b4934ac43e86b1e50e20e57b91af02dd23a5716c9aac98d
-
SSDEEP
6144:wRaTX4VX/Ufjmj5QRG0HgXYityY9FmLxz:eW4VMz5HdityU0z
-
Lokibot family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1