General
-
Target
441adbf25c61c2a9cd0d21e2b492985bfbfb7e728edb4dcd53e3a7d8e652e9a2
-
Size
620KB
-
Sample
220707-zkt5wabdar
-
MD5
d5242869385cc6f80a3573f30969d32e
-
SHA1
804b91d679866e9c9a8f84abdc203aa5ac6069ef
-
SHA256
441adbf25c61c2a9cd0d21e2b492985bfbfb7e728edb4dcd53e3a7d8e652e9a2
-
SHA512
4aa4622bf2d4e23a46ffaa47e7e984afacba5a3bcbcfc872c85b9a5d38e962b2bd59870fedf81375ceb1eb87f493e0079ad0925beccaf50d63e7c30ccfda0a74
Static task
static1
Behavioral task
behavioral1
Sample
441adbf25c61c2a9cd0d21e2b492985bfbfb7e728edb4dcd53e3a7d8e652e9a2.exe
Resource
win7-20220414-en
Malware Config
Extracted
lokibot
http://strutitinca.ro/ftp/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
formbook
3.8
ra
bee-control.com
profilepaytren.com
hirntod.info
foxrivrefiber.com
redesignmind.com
prowikileaks.com
jeni86.win
franzzegarra.com
veruredrfygj.win
youzhongla.com
mynastudios.com
stop-r.net
pet-dress.com
beautiies.com
aminooctane.com
studiostraccio.com
jiazhengkj.com
itufq.info
ssco2203.com
bollywoodmoviedance.com
mishistudio.com
seoerfood.win
upan.ltd
panmacun.com
unicorn-j.com
jizhong8.com
customscripts.tech
medhealthinnovation.com
chooseken.com
thehouserentalagency.com
theplanetbistro.com
mymememap.com
ciscoandgus.com
xn--e1to83af25a.com
gs4ocz.info
aspireeducational.com
corninvest.com
choosedeltadental.com
claimskin.net
kikkass.com
wecxun.com
ammocanmaniacs.com
0s8twoonly.men
abcbondingco.biz
ethanmillsom.com
mycrazyfly.com
www-applid.com
ozgurnakliyat.com
rasheedphotography.net
smartcubicles.com
lightspeedvpn.info
chadkaukami.com
4f59.com
guidingwithpurpose.com
gaurihomes.com
lusjrt.men
dxhcpl.com
gloriascleaningservice.net
taishengjidian1688.com
hutya-prueftechnik.com
systemstest.pl
joanneferguson.com
15255577722.com
enactusulaval.com
quidotek.com
Targets
-
-
Target
441adbf25c61c2a9cd0d21e2b492985bfbfb7e728edb4dcd53e3a7d8e652e9a2
-
Size
620KB
-
MD5
d5242869385cc6f80a3573f30969d32e
-
SHA1
804b91d679866e9c9a8f84abdc203aa5ac6069ef
-
SHA256
441adbf25c61c2a9cd0d21e2b492985bfbfb7e728edb4dcd53e3a7d8e652e9a2
-
SHA512
4aa4622bf2d4e23a46ffaa47e7e984afacba5a3bcbcfc872c85b9a5d38e962b2bd59870fedf81375ceb1eb87f493e0079ad0925beccaf50d63e7c30ccfda0a74
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Formbook payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-