General
-
Target
40c4ff83099a52478b3ffc4c4a82b3a809cfe44475dfa3b6c85a2e13854cbd13.exe
-
Size
281KB
-
Sample
211202-wlyb5sbacl
-
MD5
3a6bdc952b8b9f8d1cd85812f5657f03
-
SHA1
f3f49660538afa105aed607c10654878ec771494
-
SHA256
40c4ff83099a52478b3ffc4c4a82b3a809cfe44475dfa3b6c85a2e13854cbd13
-
SHA512
10ba486248e97171ba73a9dfa1907f1d59a1fa327db067627fabb2ae09087c475b174bbdb7c5082e373f3f911fc08b2da08b11ad177a1eb6907f8bb5ea6e394a
Static task
static1
Behavioral task
behavioral1
Sample
40c4ff83099a52478b3ffc4c4a82b3a809cfe44475dfa3b6c85a2e13854cbd13.exe
Resource
win7-en-20211104
Malware Config
Extracted
lokibot
http://secure01-redirect.net/gb15/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
40c4ff83099a52478b3ffc4c4a82b3a809cfe44475dfa3b6c85a2e13854cbd13.exe
-
Size
281KB
-
MD5
3a6bdc952b8b9f8d1cd85812f5657f03
-
SHA1
f3f49660538afa105aed607c10654878ec771494
-
SHA256
40c4ff83099a52478b3ffc4c4a82b3a809cfe44475dfa3b6c85a2e13854cbd13
-
SHA512
10ba486248e97171ba73a9dfa1907f1d59a1fa327db067627fabb2ae09087c475b174bbdb7c5082e373f3f911fc08b2da08b11ad177a1eb6907f8bb5ea6e394a
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-