General
-
Target
tmp
-
Size
447KB
-
Sample
220706-hygchabhd9
-
MD5
a6353fcf3ae91664447917e56e6926e4
-
SHA1
bdef778ecb05940aad34cb06c6084a62882e1a81
-
SHA256
a268288a6fd08bdf1f7458dbfba0cfce862e6f109dc51738d51654dd2540256c
-
SHA512
e1926c0bf85470c1b5f2448825f9b67d10e4b058f2b8b8f60b3e18c41b9380583e11dcc1f30171d1c1c6682c93f645eb33713ce5fa1923f308e7e639ffb32a0c
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
http://plxnva67001gs6gljacjpqudhatjqf.ml/BN4/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
tmp
-
Size
447KB
-
MD5
a6353fcf3ae91664447917e56e6926e4
-
SHA1
bdef778ecb05940aad34cb06c6084a62882e1a81
-
SHA256
a268288a6fd08bdf1f7458dbfba0cfce862e6f109dc51738d51654dd2540256c
-
SHA512
e1926c0bf85470c1b5f2448825f9b67d10e4b058f2b8b8f60b3e18c41b9380583e11dcc1f30171d1c1c6682c93f645eb33713ce5fa1923f308e7e639ffb32a0c
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Fake 404 Response
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-