General
-
Target
f854aea8d5341b58d22eaba1475f554aaf2c904873858bd7b7be997f9bf6ab17
-
Size
532KB
-
Sample
220705-cpejnafac3
-
MD5
abee5a40587b8f1a8f1ca4ceafa8c8b8
-
SHA1
e422056f9bb9a8333f4bab3c3222753973f894f8
-
SHA256
f854aea8d5341b58d22eaba1475f554aaf2c904873858bd7b7be997f9bf6ab17
-
SHA512
14d3e09ce60a1dfd5b6df05a182833c92732b7ec670b29621ac44c81f8c9e239555be0c0fa6d7305cff9bdb4c4c80fdd6d34a45c60272dbca5d968ed88a605e3
Static task
static1
Malware Config
Extracted
lokibot
http://45.133.1.20/rostov2/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
http://�����������Ѝ������Й���Й��я��
Targets
-
-
Target
f854aea8d5341b58d22eaba1475f554aaf2c904873858bd7b7be997f9bf6ab17
-
Size
532KB
-
MD5
abee5a40587b8f1a8f1ca4ceafa8c8b8
-
SHA1
e422056f9bb9a8333f4bab3c3222753973f894f8
-
SHA256
f854aea8d5341b58d22eaba1475f554aaf2c904873858bd7b7be997f9bf6ab17
-
SHA512
14d3e09ce60a1dfd5b6df05a182833c92732b7ec670b29621ac44c81f8c9e239555be0c0fa6d7305cff9bdb4c4c80fdd6d34a45c60272dbca5d968ed88a605e3
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Fake 404 Response
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-