General
-
Target
35e62f93f1ce50c9529408c11fc4b99453330cabb2d95f5c26c4384e15580249
-
Size
196KB
-
Sample
220705-bcgykscegk
-
MD5
02f964a813c21dcfff4e0f06fbcf0bac
-
SHA1
0dc745509117844660dd0e615030faf351337cf7
-
SHA256
35e62f93f1ce50c9529408c11fc4b99453330cabb2d95f5c26c4384e15580249
-
SHA512
eead2e2a3052179b70758a33972f50ce926080b26610415ba8884f7d18eb0fbeb1de7291bec935b4205b56dbe78637df2d2b09039320ff12b405e497ef4e9532
Static task
static1
Malware Config
Extracted
lokibot
http://hyatqfuh9olahvxf.ga/BN1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
35e62f93f1ce50c9529408c11fc4b99453330cabb2d95f5c26c4384e15580249
-
Size
196KB
-
MD5
02f964a813c21dcfff4e0f06fbcf0bac
-
SHA1
0dc745509117844660dd0e615030faf351337cf7
-
SHA256
35e62f93f1ce50c9529408c11fc4b99453330cabb2d95f5c26c4384e15580249
-
SHA512
eead2e2a3052179b70758a33972f50ce926080b26610415ba8884f7d18eb0fbeb1de7291bec935b4205b56dbe78637df2d2b09039320ff12b405e497ef4e9532
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Fake 404 Response
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-