Behavioral task
behavioral1
Sample
0edfa50964df5e64c1072e528dcc884c.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0edfa50964df5e64c1072e528dcc884c.exe
Resource
win10v2004-20240508-en
General
-
Target
0edfa50964df5e64c1072e528dcc884c.exe
-
Size
104KB
-
MD5
0edfa50964df5e64c1072e528dcc884c
-
SHA1
012856ad6c2afaa7748d1ba02ce7fdec623b0eee
-
SHA256
870725e89161945a6c45da72a9930d718850e96995d6e11e2451af1de45ceaf4
-
SHA512
e34f7ded95082f75d62d5d12b90d6a5da715ddcf5a62b31234f11a4ee77ed9def186d937f4d2509b01b97db59c8943a49d7dea36a8d7c68913afa0b2a7b4467b
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqlIzmdA:nSHIG6mQwGmfOQd8YhY0/EUUG
Malware Config
Extracted
lokibot
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Lokibot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 0edfa50964df5e64c1072e528dcc884c.exe
Files
-
0edfa50964df5e64c1072e528dcc884c.exe.exe windows:5 windows x86 arch:x86
0239fd611af3d0e9b0c46c5837c80e09
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
getaddrinfo
freeaddrinfo
closesocket
WSAStartup
socket
send
recv
connect
kernel32
GetProcessHeap
HeapFree
HeapAlloc
SetLastError
GetLastError
ole32
CoCreateInstance
CoInitialize
CoUninitialize
oleaut32
VariantInit
SysFreeString
SysAllocString
Sections
.text Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 535KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.x Size: 8KB - Virtual size: 8KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE