General
-
Target
b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe
-
Size
603KB
-
Sample
200707-72f3ttrgja
-
MD5
537b024fe163c326ed10f7fbc3f38146
-
SHA1
57191d4a826280a11aadc5fd894542a6926fc702
-
SHA256
b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518
-
SHA512
0bd8fd0e77244becfe22302fbb3f06b6be797b26b66b9b89cb466ebb066892609884b8222dd377f155246b87b1a1acdabbb036f0fe72ebed65f3fef2a5cd5f89
Static task
static1
Behavioral task
behavioral1
Sample
b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe
Resource
win7
Malware Config
Extracted
lokibot
http://195.69.140.147/.op/cr.php/Gi4uJRts3jTJM
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518.exe
-
Size
603KB
-
MD5
537b024fe163c326ed10f7fbc3f38146
-
SHA1
57191d4a826280a11aadc5fd894542a6926fc702
-
SHA256
b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518
-
SHA512
0bd8fd0e77244becfe22302fbb3f06b6be797b26b66b9b89cb466ebb066892609884b8222dd377f155246b87b1a1acdabbb036f0fe72ebed65f3fef2a5cd5f89
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-