General
-
Target
f3a4f1cc5720b34b682d65f04bd122fe
-
Size
602KB
-
Sample
210727-9zkm1alefa
-
MD5
f3a4f1cc5720b34b682d65f04bd122fe
-
SHA1
9918b2802596f7185e71b21cb9a9ff6001d93c01
-
SHA256
61fc463e85fb2fa581c8d7ba3321992bfe69d28dc8ca06660875d8b9e9701ecc
-
SHA512
4f1b4c2f24dfd559be01f2f66c29b6e225cb7a6df1fb4d398b64a10984d744e5a7ec44fd7a6fab0e39ec1d8086638f734f4679a7fb263027ff698413aa5dceb8
Static task
static1
Behavioral task
behavioral1
Sample
f3a4f1cc5720b34b682d65f04bd122fe.exe
Resource
win7v20210408
Malware Config
Extracted
lokibot
http://manvim.co/fd5/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
f3a4f1cc5720b34b682d65f04bd122fe
-
Size
602KB
-
MD5
f3a4f1cc5720b34b682d65f04bd122fe
-
SHA1
9918b2802596f7185e71b21cb9a9ff6001d93c01
-
SHA256
61fc463e85fb2fa581c8d7ba3321992bfe69d28dc8ca06660875d8b9e9701ecc
-
SHA512
4f1b4c2f24dfd559be01f2f66c29b6e225cb7a6df1fb4d398b64a10984d744e5a7ec44fd7a6fab0e39ec1d8086638f734f4679a7fb263027ff698413aa5dceb8
-
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
CustAttr .NET packer
Detects CustAttr .NET packer in memory.
-
Suspicious use of SetThreadContext
-