General
-
Target
SecuriteInfo.com.Variant.Tedy.114694.19007.28649
-
Size
681KB
-
Sample
220707-t8vhnaded6
-
MD5
2cba74e140ba210f336ed6c82b623421
-
SHA1
9dfff2f3820e38134b73d14183f75839e16e0db7
-
SHA256
ac46b90f8d9ca2ae2a08ab608bd6cd3353d88684a188e4dc725f232a62d50017
-
SHA512
9ede1432bedb79d33510f2c153f8085835e389acef2b8284f91433092d1852e4fc54e86b332f159b20706dcdbb2dfeb4db0725880a4eef583722bdf0ae3d2f45
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Tedy.114694.19007.exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
http://sempersim.su/gh18/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
SecuriteInfo.com.Variant.Tedy.114694.19007.28649
-
Size
681KB
-
MD5
2cba74e140ba210f336ed6c82b623421
-
SHA1
9dfff2f3820e38134b73d14183f75839e16e0db7
-
SHA256
ac46b90f8d9ca2ae2a08ab608bd6cd3353d88684a188e4dc725f232a62d50017
-
SHA512
9ede1432bedb79d33510f2c153f8085835e389acef2b8284f91433092d1852e4fc54e86b332f159b20706dcdbb2dfeb4db0725880a4eef583722bdf0ae3d2f45
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Fake 404 Response
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-