Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
24-01-2022 18:03
Static task
static1
Behavioral task
behavioral1
Sample
4b6a6957a37e14cc031fe81b7deaa6863a6921062b8f8cd71775eaaa24c977a5.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
4b6a6957a37e14cc031fe81b7deaa6863a6921062b8f8cd71775eaaa24c977a5.exe
Resource
win10-en-20211208
General
-
Target
4b6a6957a37e14cc031fe81b7deaa6863a6921062b8f8cd71775eaaa24c977a5.exe
-
Size
277KB
-
MD5
5b2aac5ebb5296244e5633f941a976b4
-
SHA1
fd58ed72f6cbb33c8c2c98fd068b799939cb8264
-
SHA256
4b6a6957a37e14cc031fe81b7deaa6863a6921062b8f8cd71775eaaa24c977a5
-
SHA512
4f034436f22994f89623c9ce1a1dbd0ce56f00b8fea5bb7ea696c5c84fe8a0af834d2c08bf5e5c969a6e5e15092150093a2f4b9ec6ec50bfff4ba18809e7891e
Malware Config
Extracted
lokibot
http://secure01-redirect.net/gc14/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook 4b6a6957a37e14cc031fe81b7deaa6863a6921062b8f8cd71775eaaa24c977a5.exe Key opened \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 4b6a6957a37e14cc031fe81b7deaa6863a6921062b8f8cd71775eaaa24c977a5.exe Key opened \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 4b6a6957a37e14cc031fe81b7deaa6863a6921062b8f8cd71775eaaa24c977a5.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 952 4b6a6957a37e14cc031fe81b7deaa6863a6921062b8f8cd71775eaaa24c977a5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 952 4b6a6957a37e14cc031fe81b7deaa6863a6921062b8f8cd71775eaaa24c977a5.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 4b6a6957a37e14cc031fe81b7deaa6863a6921062b8f8cd71775eaaa24c977a5.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 4b6a6957a37e14cc031fe81b7deaa6863a6921062b8f8cd71775eaaa24c977a5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b6a6957a37e14cc031fe81b7deaa6863a6921062b8f8cd71775eaaa24c977a5.exe"C:\Users\Admin\AppData\Local\Temp\4b6a6957a37e14cc031fe81b7deaa6863a6921062b8f8cd71775eaaa24c977a5.exe"1⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:952