General
-
Target
DHL Shipping DOC.exe
-
Size
445KB
-
Sample
220725-f25s6agefj
-
MD5
2f74e7dd7bab708ec880e3ea2154199b
-
SHA1
bb9b3b875ec9d3e60667a8d14bfd8e1c73ab4df3
-
SHA256
598ffadc1fd20bae7b3f21e16827a4fb89c3796bd828060b7f7c00a0e4d355ad
-
SHA512
6c8678e92b5f60e1b5df77d9430e32c56f1bf790bd413c8df3d1c014208afa1f48acba5705bee7e5f6806c4ad86d06501820c374ab8175ff8eb7beab6f8a075e
Static task
static1
Behavioral task
behavioral1
Sample
DHL Shipping DOC.exe
Resource
win7-20220715-en
Malware Config
Extracted
lokibot
http://66.29.145.162/?63823197049737992
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
DHL Shipping DOC.exe
-
Size
445KB
-
MD5
2f74e7dd7bab708ec880e3ea2154199b
-
SHA1
bb9b3b875ec9d3e60667a8d14bfd8e1c73ab4df3
-
SHA256
598ffadc1fd20bae7b3f21e16827a4fb89c3796bd828060b7f7c00a0e4d355ad
-
SHA512
6c8678e92b5f60e1b5df77d9430e32c56f1bf790bd413c8df3d1c014208afa1f48acba5705bee7e5f6806c4ad86d06501820c374ab8175ff8eb7beab6f8a075e
-
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
-
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
-
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-