General
-
Target
eee2bd7ecaa05f33c083bce061536751c46e13fa790a915871df9ece1482a9c6N.exe
-
Size
368KB
-
Sample
250123-kr3y2atmel
-
MD5
20e6fb0497d4ae4435c46f845450e030
-
SHA1
8e5039c7a28ee02ab73707db3d020c730715cede
-
SHA256
eee2bd7ecaa05f33c083bce061536751c46e13fa790a915871df9ece1482a9c6
-
SHA512
d87c2c73aecd83733dbf12772a37fcb4e8d986d7f611fa9c56c144e92879268f956c5acc692af233cfeca30f8937c5ada3c38464cf366a4812b07fe1559a54de
-
SSDEEP
6144:wRaTX4VX/Ufjmj5QRG0HgXYityY9FmLx:eW4VMz5HdityU0
Static task
static1
Behavioral task
behavioral1
Sample
eee2bd7ecaa05f33c083bce061536751c46e13fa790a915871df9ece1482a9c6N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eee2bd7ecaa05f33c083bce061536751c46e13fa790a915871df9ece1482a9c6N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lokibot
http://itjskjban.gq/too/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
eee2bd7ecaa05f33c083bce061536751c46e13fa790a915871df9ece1482a9c6N.exe
-
Size
368KB
-
MD5
20e6fb0497d4ae4435c46f845450e030
-
SHA1
8e5039c7a28ee02ab73707db3d020c730715cede
-
SHA256
eee2bd7ecaa05f33c083bce061536751c46e13fa790a915871df9ece1482a9c6
-
SHA512
d87c2c73aecd83733dbf12772a37fcb4e8d986d7f611fa9c56c144e92879268f956c5acc692af233cfeca30f8937c5ada3c38464cf366a4812b07fe1559a54de
-
SSDEEP
6144:wRaTX4VX/Ufjmj5QRG0HgXYityY9FmLx:eW4VMz5HdityU0
-
Lokibot family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1