General
-
Target
tmp
-
Size
437KB
-
Sample
220707-sh1rbabdd9
-
MD5
71d01412791a15f88871c0f8f341d831
-
SHA1
e6dc3f6655a9b404c6e790b2df40a5c6288f26a0
-
SHA256
fb39efaa2d9c28e518d8b755c6df6f85478e95ac7d806deb6f98e06891675801
-
SHA512
46cd623134dc4ccdf3cf2ce703d925243860b2b7640f01cfeb6551fab35839d16bbc6374264789d963626ef701689d26cd2e273a3235a89a08647455f30e64d6
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
http://sempersim.su/gf19/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
tmp
-
Size
437KB
-
MD5
71d01412791a15f88871c0f8f341d831
-
SHA1
e6dc3f6655a9b404c6e790b2df40a5c6288f26a0
-
SHA256
fb39efaa2d9c28e518d8b755c6df6f85478e95ac7d806deb6f98e06891675801
-
SHA512
46cd623134dc4ccdf3cf2ce703d925243860b2b7640f01cfeb6551fab35839d16bbc6374264789d963626ef701689d26cd2e273a3235a89a08647455f30e64d6
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-