General
-
Target
f87b4e7c69ce161743f4b9b0001d7376e163d615ce477c390f63cadf09ffc5d4.exe
-
Size
104KB
-
Sample
250216-c3l6naxpdl
-
MD5
eb6beba0181a014ac8c0ec040cb1121a
-
SHA1
52805384c7cd1b73944525c480792a3d0319b116
-
SHA256
f87b4e7c69ce161743f4b9b0001d7376e163d615ce477c390f63cadf09ffc5d4
-
SHA512
0afb9a7d180fe017520afb39e954821f77c8b6e2e11bbf73402dcdade231d07f3b755f40606252c917b51a0f5f32d499b96b30e7f2f617c50e709eae4cd80ae4
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG
Behavioral task
behavioral1
Sample
f87b4e7c69ce161743f4b9b0001d7376e163d615ce477c390f63cadf09ffc5d4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f87b4e7c69ce161743f4b9b0001d7376e163d615ce477c390f63cadf09ffc5d4.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
lokibot
https://rottot.shop/Devil/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
f87b4e7c69ce161743f4b9b0001d7376e163d615ce477c390f63cadf09ffc5d4.exe
-
Size
104KB
-
MD5
eb6beba0181a014ac8c0ec040cb1121a
-
SHA1
52805384c7cd1b73944525c480792a3d0319b116
-
SHA256
f87b4e7c69ce161743f4b9b0001d7376e163d615ce477c390f63cadf09ffc5d4
-
SHA512
0afb9a7d180fe017520afb39e954821f77c8b6e2e11bbf73402dcdade231d07f3b755f40606252c917b51a0f5f32d499b96b30e7f2f617c50e709eae4cd80ae4
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG
-
Lokibot family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1