General
-
Target
0fb699b995c7844be905bde197f7ba9da846861a5030b1bbf15bf5a5cc9c460b.exe
-
Size
402KB
-
Sample
210726-rytytmyz96
-
MD5
c30b0bbad81350632d4c1f159834d999
-
SHA1
ce059ee391aa495a203a7570cd3c3e300068dfdb
-
SHA256
0fb699b995c7844be905bde197f7ba9da846861a5030b1bbf15bf5a5cc9c460b
-
SHA512
99e56d2d052c7e85d384ab81320695a8f2fad9e2c2e447f18a0db4bc9008e16c2967037cc9901136eb53c7b69ab7a7875a129b664a7444bff18fb87564ea31f6
Static task
static1
Behavioral task
behavioral1
Sample
0fb699b995c7844be905bde197f7ba9da846861a5030b1bbf15bf5a5cc9c460b.exe
Resource
win7v20210410
Malware Config
Extracted
lokibot
http://asiatrans.cf/BN1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
0fb699b995c7844be905bde197f7ba9da846861a5030b1bbf15bf5a5cc9c460b.exe
-
Size
402KB
-
MD5
c30b0bbad81350632d4c1f159834d999
-
SHA1
ce059ee391aa495a203a7570cd3c3e300068dfdb
-
SHA256
0fb699b995c7844be905bde197f7ba9da846861a5030b1bbf15bf5a5cc9c460b
-
SHA512
99e56d2d052c7e85d384ab81320695a8f2fad9e2c2e447f18a0db4bc9008e16c2967037cc9901136eb53c7b69ab7a7875a129b664a7444bff18fb87564ea31f6
-
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Suspicious use of SetThreadContext
-