General
-
Target
995e15583a563a4d618022a5097dce5d060855ce88a3c24b02f6b3bd5421fb32.iso
-
Size
128KB
-
Sample
250211-be78jstlgq
-
MD5
680be2ac1d240cbfcdbb1a2c1960faf0
-
SHA1
171a7357b938fccc89fa6b3d9d73f385081e8934
-
SHA256
995e15583a563a4d618022a5097dce5d060855ce88a3c24b02f6b3bd5421fb32
-
SHA512
fb96e6ead518ff4aa550fd9a1de33e1622192de6cbb68937cdc7b1eedef2516efba800f5bd6ed9e0b5f1d2fe188bd117d8372c29e866ebc029bbda873596c9fe
-
SSDEEP
3072:QE2IA1WCiUslrpyJVTrbM2OXpM4qTALP3r1u49Iqmcwm6Upm/6P/v:QEmnrYrmbjGW4Hfj9jb6wm/gv
Static task
static1
Behavioral task
behavioral1
Sample
Objednávka_(PO208919)_Agropodnik_A.S_Trnava.exe
Resource
win11-20250210-en
Malware Config
Extracted
lokibot
https://taurusfood-com-ua.cfd/RLO/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Objednávka_(PO208919)_Agropodnik_A.S_Trnava.exe
-
Size
205KB
-
MD5
522be3a6169aafdcd8cb667335561a1e
-
SHA1
9d973aa0c89ef14d8352655fa96fda19199e2f1d
-
SHA256
607ae2812c4933e7dc70081e55dac398f6729e32708ab1a723c2340dca6bd501
-
SHA512
1cdeb1798ec1bbd77db3592606d6781d4ed77ae87021609d549814ca6eee037cd8b918bf7b21d9dd949f5fe4ac34d4ad7c5b0d019744137f7b41291c0f6acc6f
-
SSDEEP
3072:w/hjZYOLYwIs9rLM2OXps4qlALF3r1u45Iymcwm6Upm/W6OEAmjc+e:ohjpLjG64D9j5Tb6wm/uEAmg+
-
Lokibot family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1