General
-
Target
SecuriteInfo.com.W32.AIDetectNet.01.28996.17572
-
Size
196KB
-
Sample
220705-d9w5waffa3
-
MD5
df608b1e6ca45b46e336d6b2c1459f80
-
SHA1
487d773c1c290028ef6070f4650ab9f59bea1dc5
-
SHA256
436f9c683b9e4050424953affd1d48ea9973687a89763b7f83d81cf5eb0ec7d2
-
SHA512
5a2e81fc0648cae440c9545b8a2190ea4773ede90a50e2ccfe9252ba47aa65d14f7c54cd8d12e4bbcd8be0a0e58ffc211d40cf85188674b9d322922e399fc231
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.AIDetectNet.01.28996.exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
http://vmopahtqdf84hfvsqepalcbcch63gdyvah.ml/BN2/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
SecuriteInfo.com.W32.AIDetectNet.01.28996.17572
-
Size
196KB
-
MD5
df608b1e6ca45b46e336d6b2c1459f80
-
SHA1
487d773c1c290028ef6070f4650ab9f59bea1dc5
-
SHA256
436f9c683b9e4050424953affd1d48ea9973687a89763b7f83d81cf5eb0ec7d2
-
SHA512
5a2e81fc0648cae440c9545b8a2190ea4773ede90a50e2ccfe9252ba47aa65d14f7c54cd8d12e4bbcd8be0a0e58ffc211d40cf85188674b9d322922e399fc231
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Fake 404 Response
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-