Analysis
-
max time kernel
128s -
max time network
153s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
07/07/2020, 12:10
Static task
static1
Behavioral task
behavioral1
Sample
5bc57905e78d6b5e5485412119f7baa42e2355512269857dc6c3823a555d01bf.exe
Resource
win7
General
-
Target
5bc57905e78d6b5e5485412119f7baa42e2355512269857dc6c3823a555d01bf.exe
-
Size
682KB
-
MD5
2af9077a756600bf6ff971b864d84f4a
-
SHA1
865b8f668ae5b89e1072ea71d8aba932d9808eff
-
SHA256
5bc57905e78d6b5e5485412119f7baa42e2355512269857dc6c3823a555d01bf
-
SHA512
f15bae647932fd8303fbf3266b3317400037f999d60ca601a8b438d8ae17590b068eef545f360d66207c9003a9c31489869b72285cba34378c0c1f2e1b731ae5
Malware Config
Extracted
lokibot
http://boeschboddenspies.com/bobby2file/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1592 5bc57905e78d6b5e5485412119f7baa42e2355512269857dc6c3823a555d01bf.exe 1592 5bc57905e78d6b5e5485412119f7baa42e2355512269857dc6c3823a555d01bf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1592 wrote to memory of 3720 1592 5bc57905e78d6b5e5485412119f7baa42e2355512269857dc6c3823a555d01bf.exe 68 PID 1592 wrote to memory of 3720 1592 5bc57905e78d6b5e5485412119f7baa42e2355512269857dc6c3823a555d01bf.exe 68 PID 1592 wrote to memory of 3720 1592 5bc57905e78d6b5e5485412119f7baa42e2355512269857dc6c3823a555d01bf.exe 68 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1592 5bc57905e78d6b5e5485412119f7baa42e2355512269857dc6c3823a555d01bf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1592 set thread context of 3720 1592 5bc57905e78d6b5e5485412119f7baa42e2355512269857dc6c3823a555d01bf.exe 68 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3720 5bc57905e78d6b5e5485412119f7baa42e2355512269857dc6c3823a555d01bf.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3720 5bc57905e78d6b5e5485412119f7baa42e2355512269857dc6c3823a555d01bf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bc57905e78d6b5e5485412119f7baa42e2355512269857dc6c3823a555d01bf.exe"C:\Users\Admin\AppData\Local\Temp\5bc57905e78d6b5e5485412119f7baa42e2355512269857dc6c3823a555d01bf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\5bc57905e78d6b5e5485412119f7baa42e2355512269857dc6c3823a555d01bf.exe"C:\Users\Admin\AppData\Local\Temp\5bc57905e78d6b5e5485412119f7baa42e2355512269857dc6c3823a555d01bf.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: RenamesItself
PID:3720
-