General
-
Target
b7dfe331c6260d43efacb7ca54ce480d64c832209d4c013371d76590bedc0ba4.exe
-
Size
158KB
-
Sample
220514-q5h4nsccfm
-
MD5
fc48281921537737b4e8f6a13e234c6f
-
SHA1
49572865abff97bafc25256452b2e2e3c692dc5d
-
SHA256
b7dfe331c6260d43efacb7ca54ce480d64c832209d4c013371d76590bedc0ba4
-
SHA512
2142d2eeadbf0616fda2585ff06916a3e990d3ca90a89f0695bbf086ece3db99677463075e2f6c2c61eae9949d28537e4f056d0d2ae3f271aaea0fc18f7bbd84
Static task
static1
Behavioral task
behavioral1
Sample
b7dfe331c6260d43efacb7ca54ce480d64c832209d4c013371d76590bedc0ba4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b7dfe331c6260d43efacb7ca54ce480d64c832209d4c013371d76590bedc0ba4.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
lokibot
http://hyatqfuh9olahvxf.ga/Legend/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
b7dfe331c6260d43efacb7ca54ce480d64c832209d4c013371d76590bedc0ba4.exe
-
Size
158KB
-
MD5
fc48281921537737b4e8f6a13e234c6f
-
SHA1
49572865abff97bafc25256452b2e2e3c692dc5d
-
SHA256
b7dfe331c6260d43efacb7ca54ce480d64c832209d4c013371d76590bedc0ba4
-
SHA512
2142d2eeadbf0616fda2585ff06916a3e990d3ca90a89f0695bbf086ece3db99677463075e2f6c2c61eae9949d28537e4f056d0d2ae3f271aaea0fc18f7bbd84
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Fake 404 Response
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-