General
-
Target
edc773741982183fbbca2bc01649bdd6904f8aac5392cec6cfcfeab881c1e727.exe
-
Size
154KB
-
Sample
200713-ctqb4zffds
-
MD5
d8ac268c14e3fec94e2e5d8b4bcb2b10
-
SHA1
e35f41e58941b087e60e861067bbe98673b98185
-
SHA256
edc773741982183fbbca2bc01649bdd6904f8aac5392cec6cfcfeab881c1e727
-
SHA512
c316d05bf2ddf3af51fc051f2ecfa1e422894003a16b6301f10ff7ea05aff7c9bb889b4d5ceb7f9343ea4c532a79f7774dd212e764e2119fc5ebad4941f4e5e7
Static task
static1
Behavioral task
behavioral1
Sample
edc773741982183fbbca2bc01649bdd6904f8aac5392cec6cfcfeab881c1e727.exe
Resource
win7
Behavioral task
behavioral2
Sample
edc773741982183fbbca2bc01649bdd6904f8aac5392cec6cfcfeab881c1e727.exe
Resource
win10v200430
Malware Config
Extracted
lokibot
http://79.124.8.8/plesk-site-preview/akinsab.ru/http/79.124.8.8/lento/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
edc773741982183fbbca2bc01649bdd6904f8aac5392cec6cfcfeab881c1e727.exe
-
Size
154KB
-
MD5
d8ac268c14e3fec94e2e5d8b4bcb2b10
-
SHA1
e35f41e58941b087e60e861067bbe98673b98185
-
SHA256
edc773741982183fbbca2bc01649bdd6904f8aac5392cec6cfcfeab881c1e727
-
SHA512
c316d05bf2ddf3af51fc051f2ecfa1e422894003a16b6301f10ff7ea05aff7c9bb889b4d5ceb7f9343ea4c532a79f7774dd212e764e2119fc5ebad4941f4e5e7
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-