General
-
Target
K_29062020.exe
-
Size
239KB
-
Sample
200630-xmmlr8w91x
-
MD5
f4005a8e6c90f6be60b00fd3e9b78d9c
-
SHA1
db59c3f86aab8054773540434fcef3a18ccda89f
-
SHA256
8e46fce2bda79da5d4d8a9b5f3dc6c8295eee0968a9114e0559977f22dd71812
-
SHA512
32189865770a08f7526f6735e14cc185423ac0dd2566368cd1cc7471e4c07762104f399fa3a710df504a2b931b84aa1038e4af06488f8788b515671b940fe000
Static task
static1
Behavioral task
behavioral1
Sample
K_29062020.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
K_29062020.exe
Resource
win10
Malware Config
Extracted
lokibot
http://shehig.com/kingoo/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
K_29062020.exe
-
Size
239KB
-
MD5
f4005a8e6c90f6be60b00fd3e9b78d9c
-
SHA1
db59c3f86aab8054773540434fcef3a18ccda89f
-
SHA256
8e46fce2bda79da5d4d8a9b5f3dc6c8295eee0968a9114e0559977f22dd71812
-
SHA512
32189865770a08f7526f6735e14cc185423ac0dd2566368cd1cc7471e4c07762104f399fa3a710df504a2b931b84aa1038e4af06488f8788b515671b940fe000
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-