General
-
Target
87943c74c5d920ae13509cc7c9788c39f83df3c48be7cabb695988a6cae5f9f9
-
Size
347KB
-
Sample
220521-m42mvadad9
-
MD5
7761e00e82b9bf65c0d9f8daa49337c8
-
SHA1
4cef4d9a7389267536cd3fcbb6404aadc5c212fe
-
SHA256
87943c74c5d920ae13509cc7c9788c39f83df3c48be7cabb695988a6cae5f9f9
-
SHA512
40f69dab0d6567a9e5bd277b52ce31c399a8ce02cfe78ba8d955936fa6cd7d8715e7f6a8a9170be9162b47ef6c394fc707f7f27e36b59c26c0da73ae782c9bda
Static task
static1
Behavioral task
behavioral1
Sample
Quotataion Request.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
Quotataion Request.exe
-
Size
587KB
-
MD5
040e497c26b9609145715352da4e76d1
-
SHA1
901893e827a35fddca1563c35514c69d86899993
-
SHA256
b7a17727462906ac85e4082ac63a7a3884e67c222e36e9696e445b3ff882bf28
-
SHA512
be1d41b502417f17fffacc5359cf2a4c4c09815543d0288d87e7834429ea797edb8fde7f7bcf64b67e5932329b20743c9766632bd6b90247c61b00e88e6bbc87
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-