General
-
Target
Informe bancario.pdf.exe
-
Size
490KB
-
Sample
220701-tfqc8sbeh9
-
MD5
3478108e177eb3a67ac16b398ab58918
-
SHA1
f3e9c0542a332192856efccc7a023fd4f5d89e5a
-
SHA256
a34e892192ae65805daa3aeb9eb0aefcbf2b4d55c31ab0468d91b93c7c3f7a6f
-
SHA512
1a721e709123c89d9172802b6149a26bbbe47d26a3cd579d60981053f09e691caf595503dc3427d3a83de9e28d2b118e93ba8d0ce2a95405ac4837dfe4107e0e
Static task
static1
Behavioral task
behavioral1
Sample
Informe bancario.pdf.exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
http://kossa.xyz/esi/pp/play.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Informe bancario.pdf.exe
-
Size
490KB
-
MD5
3478108e177eb3a67ac16b398ab58918
-
SHA1
f3e9c0542a332192856efccc7a023fd4f5d89e5a
-
SHA256
a34e892192ae65805daa3aeb9eb0aefcbf2b4d55c31ab0468d91b93c7c3f7a6f
-
SHA512
1a721e709123c89d9172802b6149a26bbbe47d26a3cd579d60981053f09e691caf595503dc3427d3a83de9e28d2b118e93ba8d0ce2a95405ac4837dfe4107e0e
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Fake 404 Response
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-