General
-
Target
1.exe
-
Size
217KB
-
Sample
220701-jz6t8acge4
-
MD5
c6369cd371a127b4406a7288e0b9adc3
-
SHA1
6e1f4e0f79e6ab899b27ff9122c47a79eeec8e9c
-
SHA256
b55a00d81c4d0836a758245215ba2b547e172a8710f53aa32c64b82d191b60a2
-
SHA512
15d3978bce3752c97d398df63852dd206a0c109f8a6df5929dca58593a09faa38bf8fd0728991835aad8b8a6f1d51974129eae276b5e094bb4b71b4f1e2e8254
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
http://2.56.57.50/purelogs/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
1.exe
-
Size
217KB
-
MD5
c6369cd371a127b4406a7288e0b9adc3
-
SHA1
6e1f4e0f79e6ab899b27ff9122c47a79eeec8e9c
-
SHA256
b55a00d81c4d0836a758245215ba2b547e172a8710f53aa32c64b82d191b60a2
-
SHA512
15d3978bce3752c97d398df63852dd206a0c109f8a6df5929dca58593a09faa38bf8fd0728991835aad8b8a6f1d51974129eae276b5e094bb4b71b4f1e2e8254
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Fake 404 Response
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-