General
-
Target
07acaa3b3daa02b7553fec44fa3a8de8fbe2f438204bda2aba8c4a2a92c7b6bc
-
Size
249KB
-
Sample
211111-s4bz3sgfcm
-
MD5
308da612e1deb4a2aa968cc2db215c13
-
SHA1
9784fcaf00d0979e76b93d23171f8c027b4068e3
-
SHA256
07acaa3b3daa02b7553fec44fa3a8de8fbe2f438204bda2aba8c4a2a92c7b6bc
-
SHA512
a5b1e677699269e5802ef037d7a83e0401d4f484d190389a8da101f02c3b7cd73400472ae91078da72379da37c63e9f71e466b8ce1efb4043320c04f41366e01
Static task
static1
Malware Config
Extracted
lokibot
http://secure01-redirect.net/ga27/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
07acaa3b3daa02b7553fec44fa3a8de8fbe2f438204bda2aba8c4a2a92c7b6bc
-
Size
249KB
-
MD5
308da612e1deb4a2aa968cc2db215c13
-
SHA1
9784fcaf00d0979e76b93d23171f8c027b4068e3
-
SHA256
07acaa3b3daa02b7553fec44fa3a8de8fbe2f438204bda2aba8c4a2a92c7b6bc
-
SHA512
a5b1e677699269e5802ef037d7a83e0401d4f484d190389a8da101f02c3b7cd73400472ae91078da72379da37c63e9f71e466b8ce1efb4043320c04f41366e01
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-