General
-
Target
06c78481784306da093661508a10e91286a250d5931d52f898b05b5c2c6a5ce4
-
Size
366KB
-
Sample
220703-wb9bnachb4
-
MD5
419d5031ba6174b70fbad1b1e9a566a3
-
SHA1
99a03eb868da6ef1157299cfa6b69335b2ca1de3
-
SHA256
06c78481784306da093661508a10e91286a250d5931d52f898b05b5c2c6a5ce4
-
SHA512
afd4172e13e0848b7efbfb5d12bccc749486157f87118ca9818bb233f8c5d36f25830027a1d3543c2f521cdfb97c6db4b87c198d4d201e641377a96c70d2b172
Static task
static1
Behavioral task
behavioral1
Sample
new new.exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
https://site-inspection.com/.well-known/acme-challenge/w.php/9SG2m697HNpzF
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
new new.exe
-
Size
782KB
-
MD5
afcc8f5580ad3f6299bd162e1a318e5c
-
SHA1
5f781b0dc34ad6039f72aa5d3577c3fb557698ca
-
SHA256
530d3c3a4581d772f274471d4fe6ae2de68ac3b48f89b3fbfe98e4fcf8f44830
-
SHA512
96edc06c0f2e0a437b83f879e73180d2d6a6df8f6dcefba90fd76a1d1d4289c786f8211327c0a83dc852aca833202c0a8eb0a02faa3429eb4453becd57b589fd
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-