1.0.transferencia bancaria.pdf.exe.400000.0.unpack | SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth | - 0x13e78:$s1: http://
- 0x17633:$s1: http://
- 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
- 0x13e80:$s2: https://
- 0x13e78:$f1: http://
- 0x17633:$f1: http://
- 0x13e80:$f2: https://
|
1.0.transferencia bancaria.pdf.exe.400000.0.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
1.0.transferencia bancaria.pdf.exe.400000.0.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
1.0.transferencia bancaria.pdf.exe.400000.0.unpack | JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | |
1.0.transferencia bancaria.pdf.exe.400000.0.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x16536:$f1: FileZilla\recentservers.xml
- 0x16576:$f2: FileZilla\sitemanager.xml
- 0x147e6:$b2: Mozilla\Firefox\Profiles
- 0x14550:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x146fa:$s4: logins.json
- 0x155a4:$s6: wand.dat
- 0x14024:$a1: username_value
- 0x14014:$a2: password_value
- 0x1465f:$a3: encryptedUsername
- 0x146cc:$a3: encryptedUsername
- 0x14672:$a4: encryptedPassword
- 0x146e0:$a4: encryptedPassword
|
1.0.transferencia bancaria.pdf.exe.400000.0.unpack | Windows_Trojan_Lokibot_1f885282 | unknown | unknown | - 0x173f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
|
1.0.transferencia bancaria.pdf.exe.400000.0.unpack | Windows_Trojan_Lokibot_0f421617 | unknown | unknown | - 0x47bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
|
1.0.transferencia bancaria.pdf.exe.400000.0.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x13ffc:$a2: last_compatible_version
|
1.0.transferencia bancaria.pdf.exe.400000.0.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x12fff:$des3: 68 03 66 00 00
- 0x173f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x174bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack | SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth | - 0x13278:$s1: http://
- 0x16233:$s1: http://
- 0x16c74:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
- 0x13280:$s2: https://
- 0x13278:$f1: http://
- 0x16233:$f1: http://
- 0x13280:$f2: https://
|
0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack | Windows_Trojan_Lokibot_1f885282 | unknown | unknown | - 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
|
0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack | Windows_Trojan_Lokibot_0f421617 | unknown | unknown | - 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
|
0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x133fc:$a2: last_compatible_version
|
0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x123ff:$des3: 68 03 66 00 00
- 0x15ff0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x160bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack | SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth | - 0x13e78:$s1: http://
- 0x17633:$s1: http://
- 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
- 0x13e80:$s2: https://
- 0x13e78:$f1: http://
- 0x17633:$f1: http://
- 0x13e80:$f2: https://
|
0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack | JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | |
0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x16536:$f1: FileZilla\recentservers.xml
- 0x16576:$f2: FileZilla\sitemanager.xml
- 0x147e6:$b2: Mozilla\Firefox\Profiles
- 0x14550:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x146fa:$s4: logins.json
- 0x155a4:$s6: wand.dat
- 0x14024:$a1: username_value
- 0x14014:$a2: password_value
- 0x1465f:$a3: encryptedUsername
- 0x146cc:$a3: encryptedUsername
- 0x14672:$a4: encryptedPassword
- 0x146e0:$a4: encryptedPassword
|
0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack | Windows_Trojan_Lokibot_1f885282 | unknown | unknown | - 0x173f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
|
0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack | Windows_Trojan_Lokibot_0f421617 | unknown | unknown | - 0x47bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
|
0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x13ffc:$a2: last_compatible_version
|
0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x12fff:$des3: 68 03 66 00 00
- 0x173f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x174bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack | SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth | - 0x369f8:$s1: http://
- 0x3a1b3:$s1: http://
- 0x3ac0c:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
- 0x36a00:$s2: https://
- 0x369f8:$f1: http://
- 0x3a1b3:$f1: http://
- 0x36a00:$f2: https://
|
0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack | JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security | |
0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack | JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | |
0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x390b6:$f1: FileZilla\recentservers.xml
- 0x390f6:$f2: FileZilla\sitemanager.xml
- 0x37366:$b2: Mozilla\Firefox\Profiles
- 0x370d0:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x3727a:$s4: logins.json
- 0x38124:$s6: wand.dat
- 0x36ba4:$a1: username_value
- 0x36b94:$a2: password_value
- 0x371df:$a3: encryptedUsername
- 0x3724c:$a3: encryptedUsername
- 0x371f2:$a4: encryptedPassword
- 0x37260:$a4: encryptedPassword
|
0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack | INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste | Detects executables potentially checking for WinJail sandbox window | ditekSHen | - 0xc2a6:$v1: SbieDll.dll
- 0xc2c0:$v2: USER
- 0xc2cc:$v3: SANDBOX
- 0xc2de:$v4: VIRUS
- 0xc32e:$v4: VIRUS
- 0xc2ec:$v5: MALWARE
- 0xc2fe:$v6: SCHMIDTI
- 0xc312:$v7: CURRENTUSER
|
0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack | Windows_Trojan_Lokibot_1f885282 | unknown | unknown | - 0x39f70:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
|
0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack | Windows_Trojan_Lokibot_0f421617 | unknown | unknown | - 0x2732f:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
|
0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x36934:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x36b7c:$a2: last_compatible_version
|
0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x35b73:$des3: 68 03 66 00 00
- 0x39f70:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x3a03c:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack | SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth | - 0x13e78:$s1: http://
- 0x17633:$s1: http://
- 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
- 0x13e80:$s2: https://
- 0x13e78:$f1: http://
- 0x17633:$f1: http://
- 0x13e80:$f2: https://
|
0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack | JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | |
0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x16536:$f1: FileZilla\recentservers.xml
- 0x16576:$f2: FileZilla\sitemanager.xml
- 0x147e6:$b2: Mozilla\Firefox\Profiles
- 0x14550:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x146fa:$s4: logins.json
- 0x155a4:$s6: wand.dat
- 0x14024:$a1: username_value
- 0x14014:$a2: password_value
- 0x1465f:$a3: encryptedUsername
- 0x146cc:$a3: encryptedUsername
- 0x14672:$a4: encryptedPassword
- 0x146e0:$a4: encryptedPassword
|
0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack | Windows_Trojan_Lokibot_1f885282 | unknown | unknown | - 0x173f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
|
0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack | Windows_Trojan_Lokibot_0f421617 | unknown | unknown | - 0x47bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
|
0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x13ffc:$a2: last_compatible_version
|
0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x12fff:$des3: 68 03 66 00 00
- 0x173f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x174bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
0.2.transferencia bancaria.pdf.exe.442b890.12.unpack | SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth | - 0x13278:$s1: http://
- 0x16233:$s1: http://
- 0x16c74:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
- 0x13280:$s2: https://
- 0x13278:$f1: http://
- 0x16233:$f1: http://
- 0x13280:$f2: https://
|
0.2.transferencia bancaria.pdf.exe.442b890.12.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
0.2.transferencia bancaria.pdf.exe.442b890.12.unpack | Windows_Trojan_Lokibot_1f885282 | unknown | unknown | - 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
|
0.2.transferencia bancaria.pdf.exe.442b890.12.unpack | Windows_Trojan_Lokibot_0f421617 | unknown | unknown | - 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
|
0.2.transferencia bancaria.pdf.exe.442b890.12.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x133fc:$a2: last_compatible_version
|
0.2.transferencia bancaria.pdf.exe.442b890.12.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x123ff:$des3: 68 03 66 00 00
- 0x15ff0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x160bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
Click to see the 45 entries |