General
-
Target
87cb5e766fcebfe369c3407389d46ff0
-
Size
550KB
-
Sample
220704-lbaszsgaem
-
MD5
87cb5e766fcebfe369c3407389d46ff0
-
SHA1
bd2a631e0c15743396ec0977bee3513d2f4c1c64
-
SHA256
21b58ced0bde178a02008f0140786eee77dfa27651673881c76538e54b7ce34c
-
SHA512
ed12db0e09f96a8a6436953c32112f93551a152024b5fcac88a85b67abe3b549c2f9e592d6a608e3b3e2f8a47fe613c44300ffc28bcaa285968ee2c3c7a6635c
Static task
static1
Behavioral task
behavioral1
Sample
87cb5e766fcebfe369c3407389d46ff0.exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
http://62.197.136.176/health4/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
http://��������������З������Й���Й��я��
Targets
-
-
Target
87cb5e766fcebfe369c3407389d46ff0
-
Size
550KB
-
MD5
87cb5e766fcebfe369c3407389d46ff0
-
SHA1
bd2a631e0c15743396ec0977bee3513d2f4c1c64
-
SHA256
21b58ced0bde178a02008f0140786eee77dfa27651673881c76538e54b7ce34c
-
SHA512
ed12db0e09f96a8a6436953c32112f93551a152024b5fcac88a85b67abe3b549c2f9e592d6a608e3b3e2f8a47fe613c44300ffc28bcaa285968ee2c3c7a6635c
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Fake 404 Response
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-