General

  • Target

    fabb9cedf115627ea43633dc8f064ddf8bf660036d0f5743ef0dada4b983db4a.exe

  • Size

    96KB

  • MD5

    95574990294038735668bcbcbc901f8e

  • SHA1

    368d52901d5dd8caeac8b0cbdd7086952ec3fd1c

  • SHA256

    fabb9cedf115627ea43633dc8f064ddf8bf660036d0f5743ef0dada4b983db4a

  • SHA512

    f96ca75aee0fb9c922743532402f114def45474c0b46eda438a5d895f0c6181eaac7a4002e6007fd1d4b433ce90d7f8bd35018a7b0d470204208906a1da0bbea

  • SSDEEP

    1536:6zvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqcIzmd:hSHIG6mQwGmfOQd8YhY0/E1UG

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://tampabayllc.top/teamb/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables containing common artifacts observed in infostealers 1 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 1 IoCs
  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • fabb9cedf115627ea43633dc8f064ddf8bf660036d0f5743ef0dada4b983db4a.exe
    .exe windows:5 windows x86 arch:x86

    0239fd611af3d0e9b0c46c5837c80e09


    Headers

    Imports

    Sections