General

  • Target

    4faa0f24f8100aac8478d7d90f0b9f2320a81d3fac35e44244c638884352c5b1.exe

  • Size

    96KB

  • MD5

    2dc4472c7d31c26df08a099d8054a49a

  • SHA1

    c4e13bc38d07910435d459890256f44afd42859f

  • SHA256

    4faa0f24f8100aac8478d7d90f0b9f2320a81d3fac35e44244c638884352c5b1

  • SHA512

    0ad06995cf13eeb83860f3c22831d29c137442826a5cc1e98bb42742f7ed2bbc16e10d8d0daeb4db496e8147e5e85c698e71afe5a0d9234e7a95294c0d5b5033

  • SSDEEP

    1536:6zvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqnIzmd:hSHIG6mQwGmfOQd8YhY0/EKUG

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://seadrill.top/kelvin/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables containing common artifacts observed in infostealers 1 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 1 IoCs
  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4faa0f24f8100aac8478d7d90f0b9f2320a81d3fac35e44244c638884352c5b1.exe
    .exe windows:5 windows x86 arch:x86

    0239fd611af3d0e9b0c46c5837c80e09


    Headers

    Imports

    Sections