General
-
Target
26a10b1d7f7bb87c9abe752c46466a67e9101de8d38b3dbce968b1f8f7ff9324.exe
-
Size
295KB
-
Sample
211028-n9z7msgcej
-
MD5
0630ba5975cc66be04f5cf19940f5217
-
SHA1
c2c278197c7cdcef77b69d5d908b8e6b14390ebf
-
SHA256
26a10b1d7f7bb87c9abe752c46466a67e9101de8d38b3dbce968b1f8f7ff9324
-
SHA512
9e2aa696aad41ed6db3f2d315cb6bd4cba38bd976d9431cfa498f570e3484f3cca9d67ace79a63eb3ff04907fd56ebaa0f0892f088e1e7a893a6b56309c8f82e
Static task
static1
Behavioral task
behavioral1
Sample
26a10b1d7f7bb87c9abe752c46466a67e9101de8d38b3dbce968b1f8f7ff9324.exe
Resource
win7-en-20210920
Malware Config
Extracted
lokibot
http://23.254.225.235/vote/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
26a10b1d7f7bb87c9abe752c46466a67e9101de8d38b3dbce968b1f8f7ff9324.exe
-
Size
295KB
-
MD5
0630ba5975cc66be04f5cf19940f5217
-
SHA1
c2c278197c7cdcef77b69d5d908b8e6b14390ebf
-
SHA256
26a10b1d7f7bb87c9abe752c46466a67e9101de8d38b3dbce968b1f8f7ff9324
-
SHA512
9e2aa696aad41ed6db3f2d315cb6bd4cba38bd976d9431cfa498f570e3484f3cca9d67ace79a63eb3ff04907fd56ebaa0f0892f088e1e7a893a6b56309c8f82e
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-