General
-
Target
BANK_RECEIPT_PDF.exe
-
Size
209KB
-
Sample
200630-jp1j4gc2s2
-
MD5
13b9d3990d60a56c5659e1bfb63a87c5
-
SHA1
66eaefe211b835712145edd82fea6fceeac4f31e
-
SHA256
d99e015f0b74d50841cb3122a2c84d2ba549667e3018d571d1383fe4ec49ae69
-
SHA512
3742ebd3b9f005b465bf1f44218707e3fadf9fc8574727ba57258688c01c426982149fc9c6334e94b6364adbaf525eb181768fcf4fbd11dea248894b1556586c
Static task
static1
Behavioral task
behavioral1
Sample
BANK_RECEIPT_PDF.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
BANK_RECEIPT_PDF.exe
Resource
win10
Malware Config
Extracted
lokibot
http://beckhoff-th.com/kon/kon1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
BANK_RECEIPT_PDF.exe
-
Size
209KB
-
MD5
13b9d3990d60a56c5659e1bfb63a87c5
-
SHA1
66eaefe211b835712145edd82fea6fceeac4f31e
-
SHA256
d99e015f0b74d50841cb3122a2c84d2ba549667e3018d571d1383fe4ec49ae69
-
SHA512
3742ebd3b9f005b465bf1f44218707e3fadf9fc8574727ba57258688c01c426982149fc9c6334e94b6364adbaf525eb181768fcf4fbd11dea248894b1556586c
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-