General
-
Target
RFQ Global Trading SPA 04.img.com
-
Size
701KB
-
Sample
200716-zyxg68k3sa
-
MD5
87fb3a6d060e833e4eb6c74d229b3f03
-
SHA1
3ff4e981c4f2dfcdf014632c9f412de6d14a3a1c
-
SHA256
be64654bb507094ad7ace4a1da27dfe42dd6451d9dadb24b8310aa50e8ff5f34
-
SHA512
c4aefed653b191fc1297a1f1b2584f093619e2ffac0db402325d0ddff7b2fa7604e9e56cd3461261124c9575997868dd3778d36330d9db2724faa76c11b4693b
Static task
static1
Behavioral task
behavioral1
Sample
RFQ Global Trading SPA 04.img.com.exe
Resource
win7
Behavioral task
behavioral2
Sample
RFQ Global Trading SPA 04.img.com.exe
Resource
win10
Malware Config
Extracted
lokibot
http://fixerrors-mail.ga/holy/five/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
RFQ Global Trading SPA 04.img.com
-
Size
701KB
-
MD5
87fb3a6d060e833e4eb6c74d229b3f03
-
SHA1
3ff4e981c4f2dfcdf014632c9f412de6d14a3a1c
-
SHA256
be64654bb507094ad7ace4a1da27dfe42dd6451d9dadb24b8310aa50e8ff5f34
-
SHA512
c4aefed653b191fc1297a1f1b2584f093619e2ffac0db402325d0ddff7b2fa7604e9e56cd3461261124c9575997868dd3778d36330d9db2724faa76c11b4693b
Score10/10-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-