General
-
Target
sCIPrhZt5Yub9qL.exe
-
Size
734KB
-
Sample
250327-rvs2kavrs6
-
MD5
ce52f74483c87bf95fb4da1b8332b099
-
SHA1
e8056182fdf2e504d7aacfc7e4c32b9f4187a604
-
SHA256
353f0431abc35f4de737193828be509e69003e0ba6e917e60aa5ce6c025d98a0
-
SHA512
9ab6a81281c92c0d5882c0d7ddb0be9522567c7693a983010b0a3bfdf262ca13cf7e14dc006914e3fbab1b85f87b5f9bfefb3723d83b6f62c099859193e8f843
-
SSDEEP
12288:rZ9hj3yyzaEPge0YCIP9nESFDBvIHWzYvejnK73mNrpHIJo8BV+6CgqTopi:rZ1ape2IhES9Bvn+ejnKaNrg3+/gqTop
Static task
static1
Behavioral task
behavioral1
Sample
sCIPrhZt5Yub9qL.exe
Resource
win7-20240903-en
Malware Config
Extracted
lokibot
http://94.156.177.41/alpha/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
sCIPrhZt5Yub9qL.exe
-
Size
734KB
-
MD5
ce52f74483c87bf95fb4da1b8332b099
-
SHA1
e8056182fdf2e504d7aacfc7e4c32b9f4187a604
-
SHA256
353f0431abc35f4de737193828be509e69003e0ba6e917e60aa5ce6c025d98a0
-
SHA512
9ab6a81281c92c0d5882c0d7ddb0be9522567c7693a983010b0a3bfdf262ca13cf7e14dc006914e3fbab1b85f87b5f9bfefb3723d83b6f62c099859193e8f843
-
SSDEEP
12288:rZ9hj3yyzaEPge0YCIP9nESFDBvIHWzYvejnK73mNrpHIJo8BV+6CgqTopi:rZ1ape2IhES9Bvn+ejnKaNrg3+/gqTop
-
Lokibot family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-