General
-
Target
7cab67f3270d22af388a715bc460f69be5f200da4576be5940c190a008a2e765.exe
-
Size
508KB
-
Sample
250315-dlg12sxm13
-
MD5
1714930e93d8458a2de4792fc3e54551
-
SHA1
1117c156f9c69ceed004451ffe37f0059887c2cf
-
SHA256
7cab67f3270d22af388a715bc460f69be5f200da4576be5940c190a008a2e765
-
SHA512
171811910a5edd83cc53d332e713bfc4641504ecb1d6828c64c83695916fbb72a5f8429b2ae3edbfe0394eb9e1b9dbb17f60cce2ba6df6411e04314334767d07
-
SSDEEP
12288:B5MOiV1J/8dHfior5lGqTYL+kRdnC9VZPJTT:B5MOiXuX4uYL+kbCJPFT
Static task
static1
Behavioral task
behavioral1
Sample
7cab67f3270d22af388a715bc460f69be5f200da4576be5940c190a008a2e765.exe
Resource
win7-20241010-en
Malware Config
Extracted
lokibot
http://touxzw.ir/sccc/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
7cab67f3270d22af388a715bc460f69be5f200da4576be5940c190a008a2e765.exe
-
Size
508KB
-
MD5
1714930e93d8458a2de4792fc3e54551
-
SHA1
1117c156f9c69ceed004451ffe37f0059887c2cf
-
SHA256
7cab67f3270d22af388a715bc460f69be5f200da4576be5940c190a008a2e765
-
SHA512
171811910a5edd83cc53d332e713bfc4641504ecb1d6828c64c83695916fbb72a5f8429b2ae3edbfe0394eb9e1b9dbb17f60cce2ba6df6411e04314334767d07
-
SSDEEP
12288:B5MOiV1J/8dHfior5lGqTYL+kRdnC9VZPJTT:B5MOiXuX4uYL+kbCJPFT
-
Lokibot family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-