General
-
Target
Bank report.pdf.exe
-
Size
739KB
-
Sample
220704-t8vhnaccg7
-
MD5
1bea2e506f43c3291729dd46a2ce7870
-
SHA1
48213c27a51fa1259febb1830fa884a4ad4edc0f
-
SHA256
9cf8cec716494538cbf00b312c9b4cf3eb24a578e515c5fa3e7ce7ed42c8bb86
-
SHA512
79e53e4995c30c68626eb5c6ce1f5324bb1fe74e9256370c1407e257bc9757217329728e6c423836970b79ab78974c7bf2c20e1737d7e01169cccec00706b034
Static task
static1
Behavioral task
behavioral1
Sample
Bank report.pdf.exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
http://filcoco.xyz/cc/tt/fofo.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
Bank report.pdf.exe
-
Size
739KB
-
MD5
1bea2e506f43c3291729dd46a2ce7870
-
SHA1
48213c27a51fa1259febb1830fa884a4ad4edc0f
-
SHA256
9cf8cec716494538cbf00b312c9b4cf3eb24a578e515c5fa3e7ce7ed42c8bb86
-
SHA512
79e53e4995c30c68626eb5c6ce1f5324bb1fe74e9256370c1407e257bc9757217329728e6c423836970b79ab78974c7bf2c20e1737d7e01169cccec00706b034
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Fake 404 Response
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-