General
-
Target
PO-10582022.rar
-
Size
480KB
-
Sample
220701-h28adshdel
-
MD5
cfccd7d2d8ca4fd3fefe24828865479f
-
SHA1
92aba72e9bd78af4e5e11ed83d8ce6e19be595b8
-
SHA256
e8d4c4c1dc7afc5e5c7e38188ebd8ccff158201aa195f7c6c5e681fbcbbec7d6
-
SHA512
abf439acc7d914e72de1b57f57cdca3d0a9f10fccd4a88b410408a638167c620f9b4988e802d7dcb524d838d0da38b89dfd04c05edcca809fcf6c4547b711aa0
Static task
static1
Behavioral task
behavioral1
Sample
PO-10582022.exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
http://198.187.30.47/p.php?id=22289002125658625
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
PO-10582022.exe
-
Size
569KB
-
MD5
37f9b2e8ef104b2a4adcab52ad429c08
-
SHA1
0c2e7832967c91d67808fda336338e16cdd37421
-
SHA256
3464f31088630d2c06ff50b2454ddfb6556fdbcfdcc1c5692b903ea13dde809e
-
SHA512
93260c634f1779835117682b4e922cfa0337ca27d7cf988e49a193e95ea5ca8b7d24d34b16428464510ec22396822292911677b6fda4d89d51dcfd7a03398b84
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-