Analysis
-
max time kernel
102s -
max time network
121s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
16-08-2021 17:42
Static task
static1
Behavioral task
behavioral1
Sample
feKIyfpdldOh6iN.exe
Resource
win7v20210408
General
-
Target
feKIyfpdldOh6iN.exe
-
Size
586KB
-
MD5
65715e10ea8ea3f0944fa0d4f7769266
-
SHA1
e99fb439022d9c2ad1102ee67c624211b8131eb2
-
SHA256
a6ebe80f6fefcf709347f986ff5c913d0be43d98b693f18c363a2d4293d5c17a
-
SHA512
a797402c5ff58bf214c50243bdefe4c3f25be779766f19c02d459e654c695e66abbd1fb64470515374f47f05827ade29db8d1d4f5028bdfb91ed9efeb18a0913
Malware Config
Extracted
lokibot
http://fufux.xyz/io/cx/fi.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
suricata: ET MALWARE LokiBot Checkin
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
feKIyfpdldOh6iN.exedescription pid process target process PID 1932 set thread context of 752 1932 feKIyfpdldOh6iN.exe feKIyfpdldOh6iN.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
feKIyfpdldOh6iN.exepid process 752 feKIyfpdldOh6iN.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
feKIyfpdldOh6iN.exedescription pid process Token: SeDebugPrivilege 752 feKIyfpdldOh6iN.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
feKIyfpdldOh6iN.exedescription pid process target process PID 1932 wrote to memory of 752 1932 feKIyfpdldOh6iN.exe feKIyfpdldOh6iN.exe PID 1932 wrote to memory of 752 1932 feKIyfpdldOh6iN.exe feKIyfpdldOh6iN.exe PID 1932 wrote to memory of 752 1932 feKIyfpdldOh6iN.exe feKIyfpdldOh6iN.exe PID 1932 wrote to memory of 752 1932 feKIyfpdldOh6iN.exe feKIyfpdldOh6iN.exe PID 1932 wrote to memory of 752 1932 feKIyfpdldOh6iN.exe feKIyfpdldOh6iN.exe PID 1932 wrote to memory of 752 1932 feKIyfpdldOh6iN.exe feKIyfpdldOh6iN.exe PID 1932 wrote to memory of 752 1932 feKIyfpdldOh6iN.exe feKIyfpdldOh6iN.exe PID 1932 wrote to memory of 752 1932 feKIyfpdldOh6iN.exe feKIyfpdldOh6iN.exe PID 1932 wrote to memory of 752 1932 feKIyfpdldOh6iN.exe feKIyfpdldOh6iN.exe PID 1932 wrote to memory of 752 1932 feKIyfpdldOh6iN.exe feKIyfpdldOh6iN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\feKIyfpdldOh6iN.exe"C:\Users\Admin\AppData\Local\Temp\feKIyfpdldOh6iN.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\feKIyfpdldOh6iN.exe"{path}"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:752
-