General
-
Target
TNT Receipt_AWB87993766478.exe
-
Size
403KB
-
Sample
211202-ktwmqsdehl
-
MD5
36ed13b511e448619ce8ee5d4e8942c0
-
SHA1
1cea63be94a4924620772c65ffc1d8f0522cf6e1
-
SHA256
cf62df26ae345d82c6fda70f630da7e4525db99463fcb2fa69a26d5d8a926275
-
SHA512
478d3ac710a809bffcf1fcfde1abe4792ffb013fee820767703fb365ae4166b293b0e78d43b2188246cbf2bb53840b93aff17df487baf8612e2dba9c7496d2dc
Static task
static1
Behavioral task
behavioral1
Sample
TNT Receipt_AWB87993766478.exe
Resource
win7-en-20211014
Malware Config
Extracted
lokibot
http://63.250.34.171/tickets.php?id=552
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
TNT Receipt_AWB87993766478.exe
-
Size
403KB
-
MD5
36ed13b511e448619ce8ee5d4e8942c0
-
SHA1
1cea63be94a4924620772c65ffc1d8f0522cf6e1
-
SHA256
cf62df26ae345d82c6fda70f630da7e4525db99463fcb2fa69a26d5d8a926275
-
SHA512
478d3ac710a809bffcf1fcfde1abe4792ffb013fee820767703fb365ae4166b293b0e78d43b2188246cbf2bb53840b93aff17df487baf8612e2dba9c7496d2dc
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-