General
-
Target
077399d31222bda16040472c1e5327b0c783aa6b58fca29e139e6b0d18c97957.exe
-
Size
452KB
-
Sample
220514-q5h4nsccfk
-
MD5
4cb8f3bc7831ea03ff523a7e2a2a0f8b
-
SHA1
421bdf7edb784e9879a2fe56065dc03760acc847
-
SHA256
077399d31222bda16040472c1e5327b0c783aa6b58fca29e139e6b0d18c97957
-
SHA512
3870c69272284f044cb6355c179d1db88eeacd03951e973cec80e90ca4083282669e507d1cf77f1669395914b4ed6143f8ee0c3f4c37ae7a0cd4eeb0700e3caa
Static task
static1
Behavioral task
behavioral1
Sample
077399d31222bda16040472c1e5327b0c783aa6b58fca29e139e6b0d18c97957.exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
http://198.187.30.47/p.php?id=19957150644816880
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
077399d31222bda16040472c1e5327b0c783aa6b58fca29e139e6b0d18c97957.exe
-
Size
452KB
-
MD5
4cb8f3bc7831ea03ff523a7e2a2a0f8b
-
SHA1
421bdf7edb784e9879a2fe56065dc03760acc847
-
SHA256
077399d31222bda16040472c1e5327b0c783aa6b58fca29e139e6b0d18c97957
-
SHA512
3870c69272284f044cb6355c179d1db88eeacd03951e973cec80e90ca4083282669e507d1cf77f1669395914b4ed6143f8ee0c3f4c37ae7a0cd4eeb0700e3caa
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-