General
-
Target
56c19e2e628b52c856c87a84e8bd57ddda5f5003c0632382f1d313be307b4cde
-
Size
336KB
-
Sample
211025-jbtvragfhj
-
MD5
ec0897cc11ca44b815afbbee38c01316
-
SHA1
6b1bbb99701479c94dc1ec550ca15c766fa3a6f0
-
SHA256
56c19e2e628b52c856c87a84e8bd57ddda5f5003c0632382f1d313be307b4cde
-
SHA512
c85291bf53f244a403aaf412ae829c7b4aaa441e68151f449ffa1ad2f2fb539495538cbdaedfeee143dd7191f850630dd6801c3787d79c6c7ac8e5b24f4b190a
Static task
static1
Malware Config
Extracted
lokibot
http://63.250.40.204/~wpdemo/file.php?search=386869
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
56c19e2e628b52c856c87a84e8bd57ddda5f5003c0632382f1d313be307b4cde
-
Size
336KB
-
MD5
ec0897cc11ca44b815afbbee38c01316
-
SHA1
6b1bbb99701479c94dc1ec550ca15c766fa3a6f0
-
SHA256
56c19e2e628b52c856c87a84e8bd57ddda5f5003c0632382f1d313be307b4cde
-
SHA512
c85291bf53f244a403aaf412ae829c7b4aaa441e68151f449ffa1ad2f2fb539495538cbdaedfeee143dd7191f850630dd6801c3787d79c6c7ac8e5b24f4b190a
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-