General
-
Target
INVOICE 007_PACKING LIST.EXE
-
Size
1.1MB
-
Sample
200624-jxsgftwfje
-
MD5
51da2c0bde17e09fea3cac00ac37a30f
-
SHA1
d1442ae9504024f47515f0d6d0c0566d38a7e1e8
-
SHA256
dfeb957fc25e4102bf74a28e214d8ad5488d85b552824e0cd1f3c856f3a62acc
-
SHA512
635f9a0b1a76fa579ee114b80046e485374f27200c324d2f6f5631f60df40ec7c9382a61843cd8018fdfb79bfd9352bc8500c6690f2de741d3d63bf22b7a589c
Static task
static1
Behavioral task
behavioral1
Sample
INVOICE 007_PACKING LIST.EXE
Resource
win7
Malware Config
Extracted
lokibot
http://mecharnise.ir/ea2/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
INVOICE 007_PACKING LIST.EXE
-
Size
1.1MB
-
MD5
51da2c0bde17e09fea3cac00ac37a30f
-
SHA1
d1442ae9504024f47515f0d6d0c0566d38a7e1e8
-
SHA256
dfeb957fc25e4102bf74a28e214d8ad5488d85b552824e0cd1f3c856f3a62acc
-
SHA512
635f9a0b1a76fa579ee114b80046e485374f27200c324d2f6f5631f60df40ec7c9382a61843cd8018fdfb79bfd9352bc8500c6690f2de741d3d63bf22b7a589c
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-