General
-
Target
39dd09a212d8a7d21b101ee996c9eae8
-
Size
398KB
-
Sample
220623-se1l5sgdb5
-
MD5
39dd09a212d8a7d21b101ee996c9eae8
-
SHA1
f21440c9a6952ce1c7d3f080e9dcc4666106f212
-
SHA256
c94e22329965dbef963ba23ee509fe92e96371b29570f3853421dde24ad91801
-
SHA512
44e6e43fe53efc18e6dffbed36fd072317b189f96c6d1b35d97a135d9634eb33f49639ba7a3fdb8c7773fa27e7dffa17a50be41a1ea1f806a70f8a0941f70481
Static task
static1
Behavioral task
behavioral1
Sample
39dd09a212d8a7d21b101ee996c9eae8.exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
http://198.187.30.47/p.php?id=16543535265942912
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
39dd09a212d8a7d21b101ee996c9eae8
-
Size
398KB
-
MD5
39dd09a212d8a7d21b101ee996c9eae8
-
SHA1
f21440c9a6952ce1c7d3f080e9dcc4666106f212
-
SHA256
c94e22329965dbef963ba23ee509fe92e96371b29570f3853421dde24ad91801
-
SHA512
44e6e43fe53efc18e6dffbed36fd072317b189f96c6d1b35d97a135d9634eb33f49639ba7a3fdb8c7773fa27e7dffa17a50be41a1ea1f806a70f8a0941f70481
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-