General
-
Target
44fe4ae7b7e9ecf0bb52f39419f3cabc03c0c8fab4559175a4113f92fe208d4f
-
Size
665KB
-
Sample
220707-v3x72achbq
-
MD5
abfd38c3dec0cf8032d670c9ac9317bc
-
SHA1
eddc4812338bb8e1d2b45da8e60242224aa6eada
-
SHA256
44fe4ae7b7e9ecf0bb52f39419f3cabc03c0c8fab4559175a4113f92fe208d4f
-
SHA512
a352f49434760a5fcd9a9fa584a8b2d500f3a4ec95c7ea3358359fe54f72fa650b0c622ae88edd9a56f8e40ec367b3f767883f4c504f5436b7c48c9742fc0068
Static task
static1
Behavioral task
behavioral1
Sample
44fe4ae7b7e9ecf0bb52f39419f3cabc03c0c8fab4559175a4113f92fe208d4f.exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
https://publicspeaking.co.id/seun/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
44fe4ae7b7e9ecf0bb52f39419f3cabc03c0c8fab4559175a4113f92fe208d4f
-
Size
665KB
-
MD5
abfd38c3dec0cf8032d670c9ac9317bc
-
SHA1
eddc4812338bb8e1d2b45da8e60242224aa6eada
-
SHA256
44fe4ae7b7e9ecf0bb52f39419f3cabc03c0c8fab4559175a4113f92fe208d4f
-
SHA512
a352f49434760a5fcd9a9fa584a8b2d500f3a4ec95c7ea3358359fe54f72fa650b0c622ae88edd9a56f8e40ec367b3f767883f4c504f5436b7c48c9742fc0068
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-