General
-
Target
51646be768aa2ba3c5b919593f31171f32a247f08e164987bd4a4479d97454ca
-
Size
546KB
-
Sample
220706-b44lnahcc7
-
MD5
55cd077e34718e6dd5321ba23c2b0ce0
-
SHA1
4f3eaf328eacbb6b624fc8db2e0ceb87aebf980e
-
SHA256
51646be768aa2ba3c5b919593f31171f32a247f08e164987bd4a4479d97454ca
-
SHA512
84fc76e8f1e072a32dd7abe414439513d515b9ee20c0ad235ad2fe28629bdf66164ddf913ed0641f9dbc834f8dde5b01bb0f19656d014ca8719ca19d32d9b96e
Static task
static1
Malware Config
Extracted
lokibot
http://37.0.11.227/rostov1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
http://�����������Ѝ������Й���Й��я��
Targets
-
-
Target
51646be768aa2ba3c5b919593f31171f32a247f08e164987bd4a4479d97454ca
-
Size
546KB
-
MD5
55cd077e34718e6dd5321ba23c2b0ce0
-
SHA1
4f3eaf328eacbb6b624fc8db2e0ceb87aebf980e
-
SHA256
51646be768aa2ba3c5b919593f31171f32a247f08e164987bd4a4479d97454ca
-
SHA512
84fc76e8f1e072a32dd7abe414439513d515b9ee20c0ad235ad2fe28629bdf66164ddf913ed0641f9dbc834f8dde5b01bb0f19656d014ca8719ca19d32d9b96e
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Fake 404 Response
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-