Analysis
-
max time kernel
53s -
max time network
56s -
platform
windows7_x64 -
resource
win7 -
submitted
13/07/2020, 12:10
Static task
static1
Behavioral task
behavioral1
Sample
268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe
Resource
win7
General
-
Target
268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe
-
Size
851KB
-
MD5
c1eb65ab319f55bd54b91a4ade3234ab
-
SHA1
2712d7c0a08296ad0f373fce962f2cc07a2fe3ca
-
SHA256
268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63
-
SHA512
ee765845fede0d0421cd6c69b19716e8b642edaec1572fb19e0574a8737c50f420afe174f3385fe458f383409a9889faae89bcfdbf7746baa9c9a94ea2f2f9eb
Malware Config
Extracted
lokibot
http://195.69.140.147/.op/cr.php/u1DEZ4oVQPK3w
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1156 268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1156 wrote to memory of 1196 1156 268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe 24 PID 1156 wrote to memory of 1196 1156 268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe 24 PID 1156 wrote to memory of 1196 1156 268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe 24 PID 1156 wrote to memory of 1196 1156 268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe 24 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1156 268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1156 set thread context of 1196 1156 268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe 24 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1196 268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1196 268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe"C:\Users\Admin\AppData\Local\Temp\268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe"C:\Users\Admin\AppData\Local\Temp\268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: RenamesItself
PID:1196
-