General
-
Target
f2065a7ac60be2a5d2dff5996643183bc20ffcc7c94fa15a37f915ddfae216b8
-
Size
163KB
-
Sample
220521-nyj2aahdfp
-
MD5
346abf65d5e56bca93b664561de3f217
-
SHA1
5771e538b9271a631227fd1c206ca286265fc463
-
SHA256
f2065a7ac60be2a5d2dff5996643183bc20ffcc7c94fa15a37f915ddfae216b8
-
SHA512
6ae5670970bd0891766829aca80155b4335f5898c5ff6a2bbebbc998b6da361257f1ee5de6acc21b7c5d7a1c18a390817bd4f918034056bf3746b26094481d0b
Static task
static1
Behavioral task
behavioral1
Sample
PO 3619 & Samples.doc.exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
http://coolgirlsnation.com/wp-includes/debere/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
PO 3619 & Samples.doc.exe
-
Size
216KB
-
MD5
17504fe1ae0b4d904292db60323e6f6d
-
SHA1
ca12215d678ad8610239b1eb0e16aea970fe399e
-
SHA256
aad5523265a79ab035af98f1a124dc8343f3cca42c2a5143048d5b9cb9dfc547
-
SHA512
0599fbe8c1de8bfb6011bc68af08d6e3300cf0aac7afa60c02724acc3823670e490b7bd725d983dabe770a9c1dcf53c18a754ecf60072e100ea35916612de7ba
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-