General
-
Target
efaecc96942d1988b9adb7419ea8aaaae42ca045286a854109bbe9f29dc2c8f1.exe
-
Size
258KB
-
Sample
211029-n9jvnahhhm
-
MD5
4abfad65054e3e3f890a6ebb6f927d68
-
SHA1
27dd679bd31b3c4511b66321c9dbd51829989729
-
SHA256
efaecc96942d1988b9adb7419ea8aaaae42ca045286a854109bbe9f29dc2c8f1
-
SHA512
625bb855c9cc02e48e8c939b5d56aee31e26860d03c50c5cdb721565ed2e822bebdf2020b002259a1c1b55a7b3d3d71f9096745e0894ff624becc21da9004eec
Static task
static1
Behavioral task
behavioral1
Sample
efaecc96942d1988b9adb7419ea8aaaae42ca045286a854109bbe9f29dc2c8f1.exe
Resource
win7-en-20211014
Malware Config
Extracted
lokibot
http://203.159.80.151/king/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
efaecc96942d1988b9adb7419ea8aaaae42ca045286a854109bbe9f29dc2c8f1.exe
-
Size
258KB
-
MD5
4abfad65054e3e3f890a6ebb6f927d68
-
SHA1
27dd679bd31b3c4511b66321c9dbd51829989729
-
SHA256
efaecc96942d1988b9adb7419ea8aaaae42ca045286a854109bbe9f29dc2c8f1
-
SHA512
625bb855c9cc02e48e8c939b5d56aee31e26860d03c50c5cdb721565ed2e822bebdf2020b002259a1c1b55a7b3d3d71f9096745e0894ff624becc21da9004eec
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-