General
-
Target
OEoRzjI7JgSiUUd.exe
-
Size
1.1MB
-
Sample
250224-s4t6nazpy8
-
MD5
9198587cb5ed3fac57fe2693b7218dca
-
SHA1
8cd1838744b27b7ea50f62a1f32d9eb8f93aafe5
-
SHA256
b6383a5fe17a23dce23e59aee55a9d304e60b25cc7cefe9d97e7703b0886c1bf
-
SHA512
9a50e02242312e52f5f2fe0f325eabeef660915196d9c383e2d7d59bee03e50882c088af7aa1676fcaf62f84291e9fdf87e51661973834fe2050d6145ea17e08
-
SSDEEP
24576:KMrbCRQqsvpWvo3d+z2ukIlht4jt8CJjTP4XH8Ti5Ks56Tz1:KMXw/svpW2m2txKcl
Static task
static1
Behavioral task
behavioral1
Sample
OEoRzjI7JgSiUUd.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://touxzw.ir/sss2/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
OEoRzjI7JgSiUUd.exe
-
Size
1.1MB
-
MD5
9198587cb5ed3fac57fe2693b7218dca
-
SHA1
8cd1838744b27b7ea50f62a1f32d9eb8f93aafe5
-
SHA256
b6383a5fe17a23dce23e59aee55a9d304e60b25cc7cefe9d97e7703b0886c1bf
-
SHA512
9a50e02242312e52f5f2fe0f325eabeef660915196d9c383e2d7d59bee03e50882c088af7aa1676fcaf62f84291e9fdf87e51661973834fe2050d6145ea17e08
-
SSDEEP
24576:KMrbCRQqsvpWvo3d+z2ukIlht4jt8CJjTP4XH8Ti5Ks56Tz1:KMXw/svpW2m2txKcl
-
Lokibot family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-