General
-
Target
file.exe
-
Size
704KB
-
Sample
250326-qbq77axly5
-
MD5
a0e1a3e40489c7f1f73964a679cbe862
-
SHA1
9e629c75ad614f703239dce280550bacfd37999f
-
SHA256
b2b9b4ee2a4edc1926c1bfdfa07061968a2e8f3685f5cae15bfbe4723f9156c9
-
SHA512
f1be03672347150930467964711b696536a52f4e078853ba8fc228ebbd005f1312d9828772cac758ac18c109a5f915e677341510610feec99e95197441ec3f52
-
SSDEEP
12288:OdwECI8PMa2EZOMJTq94UBRJlIVWxDK7jDav3/gaNHoZz:O9UPMa2rCClIM2CIg
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://94.156.177.41/alpha/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
file.exe
-
Size
704KB
-
MD5
a0e1a3e40489c7f1f73964a679cbe862
-
SHA1
9e629c75ad614f703239dce280550bacfd37999f
-
SHA256
b2b9b4ee2a4edc1926c1bfdfa07061968a2e8f3685f5cae15bfbe4723f9156c9
-
SHA512
f1be03672347150930467964711b696536a52f4e078853ba8fc228ebbd005f1312d9828772cac758ac18c109a5f915e677341510610feec99e95197441ec3f52
-
SSDEEP
12288:OdwECI8PMa2EZOMJTq94UBRJlIVWxDK7jDav3/gaNHoZz:O9UPMa2rCClIM2CIg
-
Lokibot family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-