General
-
Target
64f4684517c685c9c326a3fb3003cebf8d473150036a2c33d82a55d4b124ec49N.exe
-
Size
1.4MB
-
Sample
250201-19qdnasqgv
-
MD5
1c55678b81947128ca2138a573530930
-
SHA1
3320e6b8c3ef535fa4814d2f7d24e4bdf11096f5
-
SHA256
64f4684517c685c9c326a3fb3003cebf8d473150036a2c33d82a55d4b124ec49
-
SHA512
162825e6e5d622ff0a0523ff03ada94a8df455e2c60fcc7358a05653fd9eade3a9c5056d95a530c794334604dc9a1aa1a6d3f7252c04f329617e352a781ce48a
-
SSDEEP
24576:NeniNMFyrDaGm2w2X1zitq8+T8BVv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:An9yrGGq2X158TjLoyEkmZ9Y14
Static task
static1
Behavioral task
behavioral1
Sample
64f4684517c685c9c326a3fb3003cebf8d473150036a2c33d82a55d4b124ec49N.exe
Resource
win7-20241010-en
Malware Config
Extracted
lokibot
http://164.90.194.235/?id=61609117220942652
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
64f4684517c685c9c326a3fb3003cebf8d473150036a2c33d82a55d4b124ec49N.exe
-
Size
1.4MB
-
MD5
1c55678b81947128ca2138a573530930
-
SHA1
3320e6b8c3ef535fa4814d2f7d24e4bdf11096f5
-
SHA256
64f4684517c685c9c326a3fb3003cebf8d473150036a2c33d82a55d4b124ec49
-
SHA512
162825e6e5d622ff0a0523ff03ada94a8df455e2c60fcc7358a05653fd9eade3a9c5056d95a530c794334604dc9a1aa1a6d3f7252c04f329617e352a781ce48a
-
SSDEEP
24576:NeniNMFyrDaGm2w2X1zitq8+T8BVv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:An9yrGGq2X158TjLoyEkmZ9Y14
-
Lokibot family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1