General
-
Target
268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe
-
Size
851KB
-
Sample
200713-w82fwgqa9x
-
MD5
c1eb65ab319f55bd54b91a4ade3234ab
-
SHA1
2712d7c0a08296ad0f373fce962f2cc07a2fe3ca
-
SHA256
268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63
-
SHA512
ee765845fede0d0421cd6c69b19716e8b642edaec1572fb19e0574a8737c50f420afe174f3385fe458f383409a9889faae89bcfdbf7746baa9c9a94ea2f2f9eb
Static task
static1
Behavioral task
behavioral1
Sample
268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe
Resource
win7
Malware Config
Extracted
lokibot
http://195.69.140.147/.op/cr.php/u1DEZ4oVQPK3w
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe
-
Size
851KB
-
MD5
c1eb65ab319f55bd54b91a4ade3234ab
-
SHA1
2712d7c0a08296ad0f373fce962f2cc07a2fe3ca
-
SHA256
268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63
-
SHA512
ee765845fede0d0421cd6c69b19716e8b642edaec1572fb19e0574a8737c50f420afe174f3385fe458f383409a9889faae89bcfdbf7746baa9c9a94ea2f2f9eb
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-