General
-
Target
cb28993cea8ec14a58ded15784eae733f6123d9c8bb9e10a39b13a311753a0b9.zip
-
Size
284KB
-
Sample
250327-jnss8ayyav
-
MD5
a64b48302c50c0b1383668a16e193f33
-
SHA1
864ab3618c67753b0c76faadc4ae86628f89ee10
-
SHA256
cb28993cea8ec14a58ded15784eae733f6123d9c8bb9e10a39b13a311753a0b9
-
SHA512
08902c5f4bd789bd23baa81aec408d19641e9942bd946a4af50319427f06c29ee453f15d57ff68fe8d0e1e1b810ca320e280d96d1a370692dcdb6dcbbd059ea2
-
SSDEEP
6144:uXc+BhRWXRcDGyO/+dFtU5GymnWMfG4wnVkzpkh:uXrBjWhcDXmmnd9kVp
Static task
static1
Behavioral task
behavioral1
Sample
97d4b97ab4f5880766783a88742969d0995cc86463e05a920486f390139667bc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
97d4b97ab4f5880766783a88742969d0995cc86463e05a920486f390139667bc.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
lokibot
http://136.243.159.53/~element/page.php?id=172
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
97d4b97ab4f5880766783a88742969d0995cc86463e05a920486f390139667bc.exe
-
Size
399KB
-
MD5
3eb855cf3d2aad29074cca7aabc54180
-
SHA1
0e9e7b3bdb690d391b941520b9acb3fe20008368
-
SHA256
97d4b97ab4f5880766783a88742969d0995cc86463e05a920486f390139667bc
-
SHA512
418a215dcf3d8a0c58207f686334836aff91862fa6ebd6d39e021abdb49f58d42d11c2b49bd4a51bb5393b7012b508c00f73420aa823efe5ab18ed3ce0ab5c67
-
SSDEEP
6144:7P40bCry6Tnh3Q+3HwOcc0WM2Y7zXNcOUqdWL7CDgrClaG9PYVoPWiN:Tugocc0WMp7rNcNqdWL7CD+ClaG9Pwu
-
Lokibot family
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses Microsoft Outlook profiles
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1