General
-
Target
invoice for your ref.exe
-
Size
819KB
-
Sample
210727-3qqlngxcm2
-
MD5
7b45379baf38ed592b3d16b792069457
-
SHA1
77d9577fc4b0956e04b6966e361e40566e65fb49
-
SHA256
405d71e7cb7e41da021090a5859e5d69749d878a6c48dc689d690a3e4ff69ec3
-
SHA512
e57f351a1d221ade47eaa467f5e0571d850a523d4ca4a7e408850bf40c4259b619302e3108e852722b483882b549a7a211c7cca53d131387df08992c743cf06b
Static task
static1
Behavioral task
behavioral1
Sample
invoice for your ref.exe
Resource
win7v20210408
Malware Config
Extracted
lokibot
http://abixmaly.duckdns.org/binge/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
invoice for your ref.exe
-
Size
819KB
-
MD5
7b45379baf38ed592b3d16b792069457
-
SHA1
77d9577fc4b0956e04b6966e361e40566e65fb49
-
SHA256
405d71e7cb7e41da021090a5859e5d69749d878a6c48dc689d690a3e4ff69ec3
-
SHA512
e57f351a1d221ade47eaa467f5e0571d850a523d4ca4a7e408850bf40c4259b619302e3108e852722b483882b549a7a211c7cca53d131387df08992c743cf06b
-
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Suspicious use of SetThreadContext
-