0.2.hfyhigXccT.exe.4395410.11.unpack | SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth | - 0x13278:$s1: http://
- 0x16233:$s1: http://
- 0x16c74:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
- 0x13280:$s2: https://
- 0x13278:$f1: http://
- 0x16233:$f1: http://
- 0x13280:$f2: https://
|
0.2.hfyhigXccT.exe.4395410.11.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
0.2.hfyhigXccT.exe.4395410.11.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x133fc:$a2: last_compatible_version
|
0.2.hfyhigXccT.exe.4395410.11.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x123ff:$des3: 68 03 66 00 00
- 0x15ff0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x160bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
5.0.hfyhigXccT.exe.400000.14.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
5.0.hfyhigXccT.exe.400000.14.raw.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
5.0.hfyhigXccT.exe.400000.14.raw.unpack | JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | |
5.0.hfyhigXccT.exe.400000.14.raw.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x17936:$f1: FileZilla\recentservers.xml
- 0x17976:$f2: FileZilla\sitemanager.xml
- 0x15be6:$b2: Mozilla\Firefox\Profiles
- 0x15950:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x15afa:$s4: logins.json
- 0x169a4:$s6: wand.dat
- 0x15424:$a1: username_value
- 0x15414:$a2: password_value
- 0x15a5f:$a3: encryptedUsername
- 0x15acc:$a3: encryptedUsername
- 0x15a72:$a4: encryptedPassword
- 0x15ae0:$a4: encryptedPassword
|
5.0.hfyhigXccT.exe.400000.14.raw.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x151b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x153fc:$a2: last_compatible_version
|
5.0.hfyhigXccT.exe.400000.14.raw.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x13bff:$des3: 68 03 66 00 00
- 0x187f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x188bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
5.0.hfyhigXccT.exe.400000.14.unpack | SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth | - 0x13e78:$s1: http://
- 0x17633:$s1: http://
- 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
- 0x13e80:$s2: https://
- 0x13e78:$f1: http://
- 0x17633:$f1: http://
- 0x13e80:$f2: https://
|
5.0.hfyhigXccT.exe.400000.14.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
5.0.hfyhigXccT.exe.400000.14.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
5.0.hfyhigXccT.exe.400000.14.unpack | JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | |
5.0.hfyhigXccT.exe.400000.14.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x16536:$f1: FileZilla\recentservers.xml
- 0x16576:$f2: FileZilla\sitemanager.xml
- 0x147e6:$b2: Mozilla\Firefox\Profiles
- 0x14550:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x146fa:$s4: logins.json
- 0x155a4:$s6: wand.dat
- 0x14024:$a1: username_value
- 0x14014:$a2: password_value
- 0x1465f:$a3: encryptedUsername
- 0x146cc:$a3: encryptedUsername
- 0x14672:$a4: encryptedPassword
- 0x146e0:$a4: encryptedPassword
|
5.0.hfyhigXccT.exe.400000.14.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x13ffc:$a2: last_compatible_version
|
5.0.hfyhigXccT.exe.400000.14.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x12fff:$des3: 68 03 66 00 00
- 0x173f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x174bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
5.0.hfyhigXccT.exe.400000.10.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
5.0.hfyhigXccT.exe.400000.10.raw.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
5.0.hfyhigXccT.exe.400000.10.raw.unpack | JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | |
5.0.hfyhigXccT.exe.400000.10.raw.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x17936:$f1: FileZilla\recentservers.xml
- 0x17976:$f2: FileZilla\sitemanager.xml
- 0x15be6:$b2: Mozilla\Firefox\Profiles
- 0x15950:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x15afa:$s4: logins.json
- 0x169a4:$s6: wand.dat
- 0x15424:$a1: username_value
- 0x15414:$a2: password_value
- 0x15a5f:$a3: encryptedUsername
- 0x15acc:$a3: encryptedUsername
- 0x15a72:$a4: encryptedPassword
- 0x15ae0:$a4: encryptedPassword
|
5.0.hfyhigXccT.exe.400000.10.raw.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x151b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x153fc:$a2: last_compatible_version
|
5.0.hfyhigXccT.exe.400000.10.raw.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x13bff:$des3: 68 03 66 00 00
- 0x187f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x188bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
0.2.hfyhigXccT.exe.4395410.11.raw.unpack | SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth | - 0x13e78:$s1: http://
- 0x17633:$s1: http://
- 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
- 0x13e80:$s2: https://
- 0x13e78:$f1: http://
- 0x17633:$f1: http://
- 0x13e80:$f2: https://
|
0.2.hfyhigXccT.exe.4395410.11.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.hfyhigXccT.exe.4395410.11.raw.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
0.2.hfyhigXccT.exe.4395410.11.raw.unpack | JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | |
0.2.hfyhigXccT.exe.4395410.11.raw.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x16536:$f1: FileZilla\recentservers.xml
- 0x16576:$f2: FileZilla\sitemanager.xml
- 0x147e6:$b2: Mozilla\Firefox\Profiles
- 0x14550:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x146fa:$s4: logins.json
- 0x155a4:$s6: wand.dat
- 0x14024:$a1: username_value
- 0x14014:$a2: password_value
- 0x1465f:$a3: encryptedUsername
- 0x146cc:$a3: encryptedUsername
- 0x14672:$a4: encryptedPassword
- 0x146e0:$a4: encryptedPassword
|
0.2.hfyhigXccT.exe.4395410.11.raw.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x13ffc:$a2: last_compatible_version
|
0.2.hfyhigXccT.exe.4395410.11.raw.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x12fff:$des3: 68 03 66 00 00
- 0x173f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x174bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
0.2.hfyhigXccT.exe.337c0e4.5.raw.unpack | SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth | - 0x3b5f8:$s1: http://
- 0x3edb3:$s1: http://
- 0x3f80c:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
- 0x3b600:$s2: https://
- 0x3b5f8:$f1: http://
- 0x3edb3:$f1: http://
- 0x3b600:$f2: https://
|
0.2.hfyhigXccT.exe.337c0e4.5.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.hfyhigXccT.exe.337c0e4.5.raw.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
0.2.hfyhigXccT.exe.337c0e4.5.raw.unpack | JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | |
0.2.hfyhigXccT.exe.337c0e4.5.raw.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x3dcb6:$f1: FileZilla\recentservers.xml
- 0x3dcf6:$f2: FileZilla\sitemanager.xml
- 0x3bf66:$b2: Mozilla\Firefox\Profiles
- 0x3bcd0:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x3be7a:$s4: logins.json
- 0x3cd24:$s6: wand.dat
- 0x3b7a4:$a1: username_value
- 0x3b794:$a2: password_value
- 0x3bddf:$a3: encryptedUsername
- 0x3be4c:$a3: encryptedUsername
- 0x3bdf2:$a4: encryptedPassword
- 0x3be60:$a4: encryptedPassword
|
0.2.hfyhigXccT.exe.337c0e4.5.raw.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x3b534:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x3b77c:$a2: last_compatible_version
|
0.2.hfyhigXccT.exe.337c0e4.5.raw.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x3a773:$des3: 68 03 66 00 00
- 0x3eb70:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x3ec3c:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
0.2.hfyhigXccT.exe.437b3f0.10.raw.unpack | SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth | - 0x13e78:$s1: http://
- 0x17633:$s1: http://
- 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
- 0x13e80:$s2: https://
- 0x13e78:$f1: http://
- 0x17633:$f1: http://
- 0x13e80:$f2: https://
|
0.2.hfyhigXccT.exe.437b3f0.10.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.hfyhigXccT.exe.437b3f0.10.raw.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
0.2.hfyhigXccT.exe.437b3f0.10.raw.unpack | JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | |
0.2.hfyhigXccT.exe.437b3f0.10.raw.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x16536:$f1: FileZilla\recentservers.xml
- 0x16576:$f2: FileZilla\sitemanager.xml
- 0x147e6:$b2: Mozilla\Firefox\Profiles
- 0x14550:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x146fa:$s4: logins.json
- 0x155a4:$s6: wand.dat
- 0x14024:$a1: username_value
- 0x14014:$a2: password_value
- 0x1465f:$a3: encryptedUsername
- 0x146cc:$a3: encryptedUsername
- 0x14672:$a4: encryptedPassword
- 0x146e0:$a4: encryptedPassword
|
0.2.hfyhigXccT.exe.437b3f0.10.raw.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x13ffc:$a2: last_compatible_version
|
0.2.hfyhigXccT.exe.437b3f0.10.raw.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x12fff:$des3: 68 03 66 00 00
- 0x173f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x174bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
5.2.hfyhigXccT.exe.400000.0.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
5.2.hfyhigXccT.exe.400000.0.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
5.2.hfyhigXccT.exe.400000.0.unpack | JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | |
5.2.hfyhigXccT.exe.400000.0.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x16536:$f1: FileZilla\recentservers.xml
- 0x16576:$f2: FileZilla\sitemanager.xml
- 0x147e6:$b2: Mozilla\Firefox\Profiles
- 0x14550:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x146fa:$s4: logins.json
- 0x155a4:$s6: wand.dat
- 0x14024:$a1: username_value
- 0x14014:$a2: password_value
- 0x1465f:$a3: encryptedUsername
- 0x146cc:$a3: encryptedUsername
- 0x14672:$a4: encryptedPassword
- 0x146e0:$a4: encryptedPassword
|
5.2.hfyhigXccT.exe.400000.0.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x13ffc:$a2: last_compatible_version
|
5.2.hfyhigXccT.exe.400000.0.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x12fff:$des3: 68 03 66 00 00
- 0x173f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x174bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
0.2.hfyhigXccT.exe.437b3f0.10.unpack | SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth | - 0x13278:$s1: http://
- 0x16233:$s1: http://
- 0x16c74:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
- 0x13280:$s2: https://
- 0x13278:$f1: http://
- 0x16233:$f1: http://
- 0x13280:$f2: https://
|
0.2.hfyhigXccT.exe.437b3f0.10.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
0.2.hfyhigXccT.exe.437b3f0.10.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x133fc:$a2: last_compatible_version
|
0.2.hfyhigXccT.exe.437b3f0.10.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x123ff:$des3: 68 03 66 00 00
- 0x15ff0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x160bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
5.0.hfyhigXccT.exe.400000.4.unpack | SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth | - 0x13e78:$s1: http://
- 0x17633:$s1: http://
- 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
- 0x13e80:$s2: https://
- 0x13e78:$f1: http://
- 0x17633:$f1: http://
- 0x13e80:$f2: https://
|
5.0.hfyhigXccT.exe.400000.4.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
5.0.hfyhigXccT.exe.400000.4.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
5.0.hfyhigXccT.exe.400000.4.unpack | JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | |
5.0.hfyhigXccT.exe.400000.4.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x16536:$f1: FileZilla\recentservers.xml
- 0x16576:$f2: FileZilla\sitemanager.xml
- 0x147e6:$b2: Mozilla\Firefox\Profiles
- 0x14550:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x146fa:$s4: logins.json
- 0x155a4:$s6: wand.dat
- 0x14024:$a1: username_value
- 0x14014:$a2: password_value
- 0x1465f:$a3: encryptedUsername
- 0x146cc:$a3: encryptedUsername
- 0x14672:$a4: encryptedPassword
- 0x146e0:$a4: encryptedPassword
|
5.0.hfyhigXccT.exe.400000.4.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x13ffc:$a2: last_compatible_version
|
5.0.hfyhigXccT.exe.400000.4.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x12fff:$des3: 68 03 66 00 00
- 0x173f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x174bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
5.0.hfyhigXccT.exe.400000.12.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
5.0.hfyhigXccT.exe.400000.12.raw.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
5.0.hfyhigXccT.exe.400000.12.raw.unpack | JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | |
5.0.hfyhigXccT.exe.400000.12.raw.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x17936:$f1: FileZilla\recentservers.xml
- 0x17976:$f2: FileZilla\sitemanager.xml
- 0x15be6:$b2: Mozilla\Firefox\Profiles
- 0x15950:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x15afa:$s4: logins.json
- 0x169a4:$s6: wand.dat
- 0x15424:$a1: username_value
- 0x15414:$a2: password_value
- 0x15a5f:$a3: encryptedUsername
- 0x15acc:$a3: encryptedUsername
- 0x15a72:$a4: encryptedPassword
- 0x15ae0:$a4: encryptedPassword
|
5.0.hfyhigXccT.exe.400000.12.raw.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x151b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x153fc:$a2: last_compatible_version
|
5.0.hfyhigXccT.exe.400000.12.raw.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x13bff:$des3: 68 03 66 00 00
- 0x187f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x188bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
5.2.hfyhigXccT.exe.400000.0.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
5.2.hfyhigXccT.exe.400000.0.raw.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
5.2.hfyhigXccT.exe.400000.0.raw.unpack | JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | |
5.2.hfyhigXccT.exe.400000.0.raw.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects execu |