Analysis
-
max time kernel
111s -
max time network
116s -
platform
windows7_x64 -
resource
win7 -
submitted
17/07/2020, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
gunzipped.exe
Resource
win7
0 signatures
0 seconds
General
-
Target
gunzipped.exe
-
Size
896KB
-
MD5
66eec316b93a7968b5c358d59854f23d
-
SHA1
713faafe38c2011fc501c2137d0b26c7ce478603
-
SHA256
9bbee036cc6c4bc82d4b9db724fe8184a2d3b9eb1a9e4fd491b617931642e540
-
SHA512
e37fb5817b3dfb87e7f2170e1e08437f432830cfe0d4f5674bd6855226e0ad158620438a2877676f06f6381b3ff2ca3bd84e48b8032f319e4e08162a0dbaa459
Malware Config
Extracted
Family
lokibot
C2
http://niskioglasi.rs/test3/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1584 wrote to memory of 552 1584 gunzipped.exe 24 PID 1584 wrote to memory of 552 1584 gunzipped.exe 24 PID 1584 wrote to memory of 552 1584 gunzipped.exe 24 PID 1584 wrote to memory of 552 1584 gunzipped.exe 24 PID 1584 wrote to memory of 552 1584 gunzipped.exe 24 PID 1584 wrote to memory of 552 1584 gunzipped.exe 24 PID 1584 wrote to memory of 552 1584 gunzipped.exe 24 PID 1584 wrote to memory of 552 1584 gunzipped.exe 24 PID 1584 wrote to memory of 552 1584 gunzipped.exe 24 PID 1584 wrote to memory of 552 1584 gunzipped.exe 24 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1584 set thread context of 552 1584 gunzipped.exe 24 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 552 gunzipped.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 552 gunzipped.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: RenamesItself
PID:552
-