Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10_x64 -
resource
win10 -
submitted
17/07/2020, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
gunzipped.exe
Resource
win7
0 signatures
0 seconds
General
-
Target
gunzipped.exe
-
Size
896KB
-
MD5
66eec316b93a7968b5c358d59854f23d
-
SHA1
713faafe38c2011fc501c2137d0b26c7ce478603
-
SHA256
9bbee036cc6c4bc82d4b9db724fe8184a2d3b9eb1a9e4fd491b617931642e540
-
SHA512
e37fb5817b3dfb87e7f2170e1e08437f432830cfe0d4f5674bd6855226e0ad158620438a2877676f06f6381b3ff2ca3bd84e48b8032f319e4e08162a0dbaa459
Malware Config
Extracted
Family
lokibot
C2
http://niskioglasi.rs/test3/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 792 wrote to memory of 3756 792 gunzipped.exe 66 PID 792 wrote to memory of 3756 792 gunzipped.exe 66 PID 792 wrote to memory of 3756 792 gunzipped.exe 66 PID 792 wrote to memory of 3756 792 gunzipped.exe 66 PID 792 wrote to memory of 3756 792 gunzipped.exe 66 PID 792 wrote to memory of 3756 792 gunzipped.exe 66 PID 792 wrote to memory of 3756 792 gunzipped.exe 66 PID 792 wrote to memory of 3756 792 gunzipped.exe 66 PID 792 wrote to memory of 3756 792 gunzipped.exe 66 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 792 set thread context of 3756 792 gunzipped.exe 66 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3756 gunzipped.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3756 gunzipped.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:792 -
C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: RenamesItself
PID:3756
-