General
-
Target
vbc (3).exe1
-
Size
207KB
-
Sample
220707-q2ypysagf7
-
MD5
54d3dc12ffff12444459dfc1b0d2e606
-
SHA1
a08c50f88b078f76852fd155a5cdaa585094ba19
-
SHA256
12bfe03fcc675f4ecacd4791a5b70aa6b48a2d847cb38c59acf6582c9c4a8f08
-
SHA512
bd417771f74be5e613dc4a50f58e83869d4cce5a47ea400bb5f9b2d94fab9522f9a77cad6531d6131b2fe91ad9da5d3499517ee33c44b439054ef4c6d8d483e0
Static task
static1
Behavioral task
behavioral1
Sample
vbc (3).exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
http://hyatqfuh9olahvxf.ga/BN1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
vbc (3).exe1
-
Size
207KB
-
MD5
54d3dc12ffff12444459dfc1b0d2e606
-
SHA1
a08c50f88b078f76852fd155a5cdaa585094ba19
-
SHA256
12bfe03fcc675f4ecacd4791a5b70aa6b48a2d847cb38c59acf6582c9c4a8f08
-
SHA512
bd417771f74be5e613dc4a50f58e83869d4cce5a47ea400bb5f9b2d94fab9522f9a77cad6531d6131b2fe91ad9da5d3499517ee33c44b439054ef4c6d8d483e0
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Fake 404 Response
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-