Analysis
-
max time kernel
136s -
max time network
52s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
13/07/2020, 12:10
Static task
static1
Behavioral task
behavioral1
Sample
268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe
Resource
win7
General
-
Target
268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe
-
Size
851KB
-
MD5
c1eb65ab319f55bd54b91a4ade3234ab
-
SHA1
2712d7c0a08296ad0f373fce962f2cc07a2fe3ca
-
SHA256
268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63
-
SHA512
ee765845fede0d0421cd6c69b19716e8b642edaec1572fb19e0574a8737c50f420afe174f3385fe458f383409a9889faae89bcfdbf7746baa9c9a94ea2f2f9eb
Malware Config
Extracted
lokibot
http://195.69.140.147/.op/cr.php/u1DEZ4oVQPK3w
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2904 268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe 2904 268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2196 2904 268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe 67 PID 2904 wrote to memory of 2196 2904 268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe 67 PID 2904 wrote to memory of 2196 2904 268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe 67 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2904 268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2904 set thread context of 2196 2904 268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe 67 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2196 268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2196 268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe"C:\Users\Admin\AppData\Local\Temp\268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe"C:\Users\Admin\AppData\Local\Temp\268c70192ec2b0f6d279ee5d946de5dc694a68cb8b27aa991a8de5c87c41dc63.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: RenamesItself
PID:2196
-