Analysis
-
max time kernel
128s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-07-2022 12:03
Static task
static1
Behavioral task
behavioral1
Sample
Informe bancario.pdf.exe
Resource
win7-20220414-en
General
-
Target
Informe bancario.pdf.exe
-
Size
548KB
-
MD5
39a287fa5181e8a44418f25805bab380
-
SHA1
8c8753d1b7121389432992ab00aaedb2e43e75db
-
SHA256
6977beeb0b7216defcd36dec65fde39cd544bd1e8de01e9d1a9a273c898c2ccd
-
SHA512
d7ce478ed4d813c84746e252b79d5cceaea9b30fb0b9498a8955b6cd9328028a2c0130252d2868e7f27ecb8d6f79185a73d582683c062274b5226371d53ceb4f
Malware Config
Extracted
lokibot
http://kossa.xyz/esi/pp/play.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Checkin
suricata: ET MALWARE LokiBot Checkin
-
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Fake 404 Response
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Informe bancario.pdf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Informe bancario.pdf.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Informe bancario.pdf.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Informe bancario.pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Informe bancario.pdf.exedescription pid process target process PID 1836 set thread context of 1424 1836 Informe bancario.pdf.exe Informe bancario.pdf.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
Informe bancario.pdf.exepid process 1424 Informe bancario.pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Informe bancario.pdf.exedescription pid process Token: SeDebugPrivilege 1424 Informe bancario.pdf.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Informe bancario.pdf.exedescription pid process target process PID 1836 wrote to memory of 1424 1836 Informe bancario.pdf.exe Informe bancario.pdf.exe PID 1836 wrote to memory of 1424 1836 Informe bancario.pdf.exe Informe bancario.pdf.exe PID 1836 wrote to memory of 1424 1836 Informe bancario.pdf.exe Informe bancario.pdf.exe PID 1836 wrote to memory of 1424 1836 Informe bancario.pdf.exe Informe bancario.pdf.exe PID 1836 wrote to memory of 1424 1836 Informe bancario.pdf.exe Informe bancario.pdf.exe PID 1836 wrote to memory of 1424 1836 Informe bancario.pdf.exe Informe bancario.pdf.exe PID 1836 wrote to memory of 1424 1836 Informe bancario.pdf.exe Informe bancario.pdf.exe PID 1836 wrote to memory of 1424 1836 Informe bancario.pdf.exe Informe bancario.pdf.exe PID 1836 wrote to memory of 1424 1836 Informe bancario.pdf.exe Informe bancario.pdf.exe PID 1836 wrote to memory of 1424 1836 Informe bancario.pdf.exe Informe bancario.pdf.exe -
outlook_office_path 1 IoCs
Processes:
Informe bancario.pdf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Informe bancario.pdf.exe -
outlook_win_path 1 IoCs
Processes:
Informe bancario.pdf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Informe bancario.pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Informe bancario.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Informe bancario.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\Informe bancario.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Informe bancario.pdf.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1424