General
-
Target
f1ae5e52aa46bb46482d99dd0acf855320c71f8388c86195a6df94d02235ff84
-
Size
243KB
-
Sample
220125-l6gvsadffl
-
MD5
16f716620dd5c0151f14e9972ceece41
-
SHA1
3769c9137ba48a84d40988d7ced98a61f3825c9b
-
SHA256
f1ae5e52aa46bb46482d99dd0acf855320c71f8388c86195a6df94d02235ff84
-
SHA512
cc01211f6bc71bfbf8de21f3a04b0944cc7be82dfdacaa0b47ac564f686ed7a4c28888e23d68feadb196d4a856cda06683b79a33f92cb38b1d9ed72903f622aa
Static task
static1
Malware Config
Extracted
lokibot
http://augmentinprod.ir/jin/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
f1ae5e52aa46bb46482d99dd0acf855320c71f8388c86195a6df94d02235ff84
-
Size
243KB
-
MD5
16f716620dd5c0151f14e9972ceece41
-
SHA1
3769c9137ba48a84d40988d7ced98a61f3825c9b
-
SHA256
f1ae5e52aa46bb46482d99dd0acf855320c71f8388c86195a6df94d02235ff84
-
SHA512
cc01211f6bc71bfbf8de21f3a04b0944cc7be82dfdacaa0b47ac564f686ed7a4c28888e23d68feadb196d4a856cda06683b79a33f92cb38b1d9ed72903f622aa
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-