General
-
Target
3353c2ea708d348c56facaab5c7aebb5a2ec6c820d076d25dc41f30fac712f6d.exe
-
Size
660KB
-
Sample
210726-a6szpl8yjs
-
MD5
766501d99026015cb61ad5dcd8858e9e
-
SHA1
822312037f313dd1099c30df72db75196ae0343e
-
SHA256
3353c2ea708d348c56facaab5c7aebb5a2ec6c820d076d25dc41f30fac712f6d
-
SHA512
cfd61d3a9b907616cf4bd852b374185144eacf2bef25d0e0429fa1a879888ca0d54672742dbfeba9511f7c78f5f92472f3bd32e6efb3d6d2639dc87902fb4d9d
Static task
static1
Behavioral task
behavioral1
Sample
3353c2ea708d348c56facaab5c7aebb5a2ec6c820d076d25dc41f30fac712f6d.exe
Resource
win7v20210410
Malware Config
Extracted
lokibot
http://lushbb.xyz/tker3/w2/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
3353c2ea708d348c56facaab5c7aebb5a2ec6c820d076d25dc41f30fac712f6d.exe
-
Size
660KB
-
MD5
766501d99026015cb61ad5dcd8858e9e
-
SHA1
822312037f313dd1099c30df72db75196ae0343e
-
SHA256
3353c2ea708d348c56facaab5c7aebb5a2ec6c820d076d25dc41f30fac712f6d
-
SHA512
cfd61d3a9b907616cf4bd852b374185144eacf2bef25d0e0429fa1a879888ca0d54672742dbfeba9511f7c78f5f92472f3bd32e6efb3d6d2639dc87902fb4d9d
-
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Suspicious use of SetThreadContext
-