General
-
Target
BHO4nbXgyZS1UQe.exe
-
Size
284KB
-
Sample
200708-3e8n4rvv3n
-
MD5
da6acb7434d0cba2fa56325e20c44999
-
SHA1
e6010b29631ac82bc096cb0c86f1e5e5908096c4
-
SHA256
c3bde0b72c52223cc2d82b11d0e3b50e43e9d2010b6b69fa2144b8a49fef2e7e
-
SHA512
261771220817ec9b3d33766e1918c42e93bebfb7e1d658af5ec270cc3b9ebba86ffa198205b3a052dcd2a2dd5a2a10e564b95b21a03900ee85af6ef75a58737f
Static task
static1
Behavioral task
behavioral1
Sample
BHO4nbXgyZS1UQe.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
BHO4nbXgyZS1UQe.exe
Resource
win10
Malware Config
Extracted
lokibot
http://t-mk.me/ig2/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
BHO4nbXgyZS1UQe.exe
-
Size
284KB
-
MD5
da6acb7434d0cba2fa56325e20c44999
-
SHA1
e6010b29631ac82bc096cb0c86f1e5e5908096c4
-
SHA256
c3bde0b72c52223cc2d82b11d0e3b50e43e9d2010b6b69fa2144b8a49fef2e7e
-
SHA512
261771220817ec9b3d33766e1918c42e93bebfb7e1d658af5ec270cc3b9ebba86ffa198205b3a052dcd2a2dd5a2a10e564b95b21a03900ee85af6ef75a58737f
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-