General
-
Target
b1e251aae227fb02659cfa8555e2794c
-
Size
797KB
-
Sample
220707-t63q9addf7
-
MD5
b1e251aae227fb02659cfa8555e2794c
-
SHA1
b4576d78ac5821cb5feccbe93b7fef88bc0e0997
-
SHA256
357d3ec91867d7a5a1a0effeba56f9e4d07c7c8b98cdf84294eeabd9f80dd516
-
SHA512
2c7065931d47a3358fc577bc74ef251a80677109fa4176e08d7f52c3fecf85f11e68fa79d51461872ba12c36d569213108abe6797fe397287977a71c36e68afe
Static task
static1
Behavioral task
behavioral1
Sample
b1e251aae227fb02659cfa8555e2794c.exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
http://45.133.1.20/health12/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
http://�����������З�������Й���Й��я��
Targets
-
-
Target
b1e251aae227fb02659cfa8555e2794c
-
Size
797KB
-
MD5
b1e251aae227fb02659cfa8555e2794c
-
SHA1
b4576d78ac5821cb5feccbe93b7fef88bc0e0997
-
SHA256
357d3ec91867d7a5a1a0effeba56f9e4d07c7c8b98cdf84294eeabd9f80dd516
-
SHA512
2c7065931d47a3358fc577bc74ef251a80677109fa4176e08d7f52c3fecf85f11e68fa79d51461872ba12c36d569213108abe6797fe397287977a71c36e68afe
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Fake 404 Response
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-