General
-
Target
f0eb25d93145b922898752c4c973c53a7b157c0a1a5052fbee243851ce58985f
-
Size
987KB
-
Sample
220521-w89cxseean
-
MD5
37e3f2fcd9821147a38738f1d9bc6819
-
SHA1
9e25cfc44f8f08c0f7da24256f625549ae71d173
-
SHA256
f0eb25d93145b922898752c4c973c53a7b157c0a1a5052fbee243851ce58985f
-
SHA512
72bbc192232b3ef3b4f1543dbc3ed1578d291ec9c141fea6c046df89360115fb8e1e3cabc97e4aa242054017a21a71c5fe2c0fcf5a70e8283587a4505f6dd4b1
Static task
static1
Behavioral task
behavioral1
Sample
EIKODO_PURCHASE-ORDER-MAY.exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
http://oneflextiank.com/click/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
EIKODO_PURCHASE-ORDER-MAY.exe
-
Size
1.4MB
-
MD5
0277b9d4e3a1da6a501acfde1777ba82
-
SHA1
bad9604e63ed6bbcc4697b163b01cdecb9db6255
-
SHA256
c224d671ef8ea5bfdc03b9a33d7ae043827b83c2ddc96e7ce128efb36f26fb9e
-
SHA512
8b2918c4093c877379f9d49ae86b8c0e504975cb4db889114777a0ff67d3a2234c39e879b1a7a8373781c560fb5036abb8665131949d401a3f6b022ac1ebbbfb
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-