General
-
Target
dacf588b59e2ea2c43f11b9beb1e08ff
-
Size
533KB
-
Sample
220705-h9hdyafacj
-
MD5
dacf588b59e2ea2c43f11b9beb1e08ff
-
SHA1
a0305acdf7da67d1cc459353810e48ce1e234046
-
SHA256
f4a259bbe7e4f60710016ffc73a3cd1d272234e8b11447fed8261cb50cad4a16
-
SHA512
155a8e47f5a5a864e2b1baea30988e4edaa9516fc8117745f0f79b7adc315f0fc88971ff0768f5eaee771e0234238f06569c5413eaee978465a115dd9611795e
Static task
static1
Behavioral task
behavioral1
Sample
dacf588b59e2ea2c43f11b9beb1e08ff.exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
http://37.0.11.227/rostov1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
http://�����������Ѝ������Й���Й��я��
Targets
-
-
Target
dacf588b59e2ea2c43f11b9beb1e08ff
-
Size
533KB
-
MD5
dacf588b59e2ea2c43f11b9beb1e08ff
-
SHA1
a0305acdf7da67d1cc459353810e48ce1e234046
-
SHA256
f4a259bbe7e4f60710016ffc73a3cd1d272234e8b11447fed8261cb50cad4a16
-
SHA512
155a8e47f5a5a864e2b1baea30988e4edaa9516fc8117745f0f79b7adc315f0fc88971ff0768f5eaee771e0234238f06569c5413eaee978465a115dd9611795e
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Fake 404 Response
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-