General
-
Target
0f4d88a4d77359be69d6a628aa348c27c5af993683d1824d9a11ead9149eaf2b
-
Size
1022KB
-
Sample
220527-2bhrlaahgk
-
MD5
1580c3b5db72184e363d5e8521462109
-
SHA1
c877974a5a9b2e16aa5741b037bce28e798f5d97
-
SHA256
0f4d88a4d77359be69d6a628aa348c27c5af993683d1824d9a11ead9149eaf2b
-
SHA512
65f2ce88166edd7c4dc4a049135d9ffb7133b069847c1a730fc4eead2e14f368adbed22c4369e070c5fb932269d0ceb2daecdc0fc62b4bd06b67a89016643dd8
Static task
static1
Behavioral task
behavioral1
Sample
0f4d88a4d77359be69d6a628aa348c27c5af993683d1824d9a11ead9149eaf2b.exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
http://ipvhost.duckdns.org:6060/host/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
0f4d88a4d77359be69d6a628aa348c27c5af993683d1824d9a11ead9149eaf2b
-
Size
1022KB
-
MD5
1580c3b5db72184e363d5e8521462109
-
SHA1
c877974a5a9b2e16aa5741b037bce28e798f5d97
-
SHA256
0f4d88a4d77359be69d6a628aa348c27c5af993683d1824d9a11ead9149eaf2b
-
SHA512
65f2ce88166edd7c4dc4a049135d9ffb7133b069847c1a730fc4eead2e14f368adbed22c4369e070c5fb932269d0ceb2daecdc0fc62b4bd06b67a89016643dd8
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-