General
-
Target
d68ce638dca53c5e61a7ad566a76885e
-
Size
104KB
-
Sample
211021-qjc1jabbgq
-
MD5
d68ce638dca53c5e61a7ad566a76885e
-
SHA1
5d11745f15a2afb559c122737e146b1437e2389b
-
SHA256
88fc9f58ddb80eab46fc3718cada7e253c027a702766dc385dc5268ee52387fd
-
SHA512
df3d53745fa8a95b00955a31aa9c41f39580a5be70864e656e4fa30a1f46b88371778646a9ea4d9dca8437ce4be0fcbffb3fa5939afeef751d5a1592714436ab
Static task
static1
Behavioral task
behavioral1
Sample
d68ce638dca53c5e61a7ad566a76885e.exe
Resource
win7-en-20210920
Malware Config
Extracted
lokibot
http://iykl2.xyz/otker1/w2/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
d68ce638dca53c5e61a7ad566a76885e
-
Size
104KB
-
MD5
d68ce638dca53c5e61a7ad566a76885e
-
SHA1
5d11745f15a2afb559c122737e146b1437e2389b
-
SHA256
88fc9f58ddb80eab46fc3718cada7e253c027a702766dc385dc5268ee52387fd
-
SHA512
df3d53745fa8a95b00955a31aa9c41f39580a5be70864e656e4fa30a1f46b88371778646a9ea4d9dca8437ce4be0fcbffb3fa5939afeef751d5a1592714436ab
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-