General
-
Target
fbc2b5163b6d128f9c70475b7349be8ac1db476416b0a5e81424a456cf6c68f0.exe
-
Size
230KB
-
Sample
200529-prwq6pdt4s
-
MD5
c0b17f93823d4c4de913f646154e8523
-
SHA1
83703feb7391fadd6f6ec70c655297164f590140
-
SHA256
fbc2b5163b6d128f9c70475b7349be8ac1db476416b0a5e81424a456cf6c68f0
-
SHA512
d6c67db737326a57f651913d73403f046563a398ae64f922494da0fcb4ea8f67e69d29bd7bd25356975bb777785f5b3ba78abb061374efa9cafa1b17644edb78
Static task
static1
Behavioral task
behavioral1
Sample
fbc2b5163b6d128f9c70475b7349be8ac1db476416b0a5e81424a456cf6c68f0.exe
Resource
win7v200430
Malware Config
Extracted
lokibot
http://www.peamachinerylltd.com/loki/ororo/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
fbc2b5163b6d128f9c70475b7349be8ac1db476416b0a5e81424a456cf6c68f0.exe
-
Size
230KB
-
MD5
c0b17f93823d4c4de913f646154e8523
-
SHA1
83703feb7391fadd6f6ec70c655297164f590140
-
SHA256
fbc2b5163b6d128f9c70475b7349be8ac1db476416b0a5e81424a456cf6c68f0
-
SHA512
d6c67db737326a57f651913d73403f046563a398ae64f922494da0fcb4ea8f67e69d29bd7bd25356975bb777785f5b3ba78abb061374efa9cafa1b17644edb78
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-