General
-
Target
Attached Documents_pdf.exe
-
Size
925KB
-
Sample
200716-1n3ssbkhva
-
MD5
9cebad4a442a08f7eacdc152a04c159e
-
SHA1
fcb5991bda8c8964447b00647784e73f57dbd852
-
SHA256
c51d4fc5a8422271d20c83380f1cb646a19ca48c6bd4e509b29579d01bd8ea68
-
SHA512
9e7a78124092ee0ce670c81fbc3c285e0d0e8f1cd3bfdf975a40dc43f440bcbd330ae5ab1be4e034530aa2115dca56c4e7db0da3f45817923d8bd958f91c7a7f
Static task
static1
Behavioral task
behavioral1
Sample
Attached Documents_pdf.exe
Resource
win7
Behavioral task
behavioral2
Sample
Attached Documents_pdf.exe
Resource
win10v200430
Malware Config
Extracted
lokibot
http://beckhoff-th.com/chief/chief1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Attached Documents_pdf.exe
-
Size
925KB
-
MD5
9cebad4a442a08f7eacdc152a04c159e
-
SHA1
fcb5991bda8c8964447b00647784e73f57dbd852
-
SHA256
c51d4fc5a8422271d20c83380f1cb646a19ca48c6bd4e509b29579d01bd8ea68
-
SHA512
9e7a78124092ee0ce670c81fbc3c285e0d0e8f1cd3bfdf975a40dc43f440bcbd330ae5ab1be4e034530aa2115dca56c4e7db0da3f45817923d8bd958f91c7a7f
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-