General
-
Target
ca9f6a11a9200ccde207ba921ae6a6dfef747f88934b90404e779a314ef92ea2.exe
-
Size
318KB
-
Sample
200708-ldfd658fmn
-
MD5
e8d71994c54e4a7538f3beaf6e2e8c1e
-
SHA1
48bfcf8b3455c62e88a7e3b38a720809be7cab32
-
SHA256
ca9f6a11a9200ccde207ba921ae6a6dfef747f88934b90404e779a314ef92ea2
-
SHA512
9dd21bce296f5760278de1942899dbfc0c310a83a27aafd7cde7a2e7f38f1c11d0f4657b993de70fdf4871628171763447d6f2e4f522416dbbf0c0440f705a1f
Static task
static1
Behavioral task
behavioral1
Sample
ca9f6a11a9200ccde207ba921ae6a6dfef747f88934b90404e779a314ef92ea2.exe
Resource
win7v200430
Malware Config
Extracted
lokibot
http://mecharnise.ir/ea1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
ca9f6a11a9200ccde207ba921ae6a6dfef747f88934b90404e779a314ef92ea2.exe
-
Size
318KB
-
MD5
e8d71994c54e4a7538f3beaf6e2e8c1e
-
SHA1
48bfcf8b3455c62e88a7e3b38a720809be7cab32
-
SHA256
ca9f6a11a9200ccde207ba921ae6a6dfef747f88934b90404e779a314ef92ea2
-
SHA512
9dd21bce296f5760278de1942899dbfc0c310a83a27aafd7cde7a2e7f38f1c11d0f4657b993de70fdf4871628171763447d6f2e4f522416dbbf0c0440f705a1f
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-