0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack | SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth | - 0x13278:$s1: http://
- 0x16233:$s1: http://
- 0x16c74:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
- 0x13280:$s2: https://
- 0x13278:$f1: http://
- 0x16233:$f1: http://
- 0x13280:$f2: https://
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack | Windows_Trojan_Lokibot_1f885282 | unknown | unknown | - 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack | Windows_Trojan_Lokibot_0f421617 | unknown | unknown | - 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x133fc:$a2: last_compatible_version
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x123ff:$des3: 68 03 66 00 00
- 0x15ff0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x160bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack | SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth | - 0x13e78:$s1: http://
- 0x17633:$s1: http://
- 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
- 0x13e80:$s2: https://
- 0x13e78:$f1: http://
- 0x17633:$f1: http://
- 0x13e80:$f2: https://
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack | JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | |
0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x16536:$f1: FileZilla\recentservers.xml
- 0x16576:$f2: FileZilla\sitemanager.xml
- 0x147e6:$b2: Mozilla\Firefox\Profiles
- 0x14550:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x146fa:$s4: logins.json
- 0x155a4:$s6: wand.dat
- 0x14024:$a1: username_value
- 0x14014:$a2: password_value
- 0x1465f:$a3: encryptedUsername
- 0x146cc:$a3: encryptedUsername
- 0x14672:$a4: encryptedPassword
- 0x146e0:$a4: encryptedPassword
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack | Windows_Trojan_Lokibot_1f885282 | unknown | unknown | - 0x173f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack | Windows_Trojan_Lokibot_0f421617 | unknown | unknown | - 0x47bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x13ffc:$a2: last_compatible_version
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x12fff:$des3: 68 03 66 00 00
- 0x173f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x174bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack | SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth | - 0x13e78:$s1: http://
- 0x17633:$s1: http://
- 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
- 0x13e80:$s2: https://
- 0x13e78:$f1: http://
- 0x17633:$f1: http://
- 0x13e80:$f2: https://
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack | JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | |
0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x16536:$f1: FileZilla\recentservers.xml
- 0x16576:$f2: FileZilla\sitemanager.xml
- 0x147e6:$b2: Mozilla\Firefox\Profiles
- 0x14550:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x146fa:$s4: logins.json
- 0x155a4:$s6: wand.dat
- 0x14024:$a1: username_value
- 0x14014:$a2: password_value
- 0x1465f:$a3: encryptedUsername
- 0x146cc:$a3: encryptedUsername
- 0x14672:$a4: encryptedPassword
- 0x146e0:$a4: encryptedPassword
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack | Windows_Trojan_Lokibot_1f885282 | unknown | unknown | - 0x173f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack | Windows_Trojan_Lokibot_0f421617 | unknown | unknown | - 0x47bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x13ffc:$a2: last_compatible_version
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x12fff:$des3: 68 03 66 00 00
- 0x173f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x174bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack | SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth | - 0x13278:$s1: http://
- 0x16233:$s1: http://
- 0x16c74:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
- 0x13280:$s2: https://
- 0x13278:$f1: http://
- 0x16233:$f1: http://
- 0x13280:$f2: https://
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack | Windows_Trojan_Lokibot_1f885282 | unknown | unknown | - 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack | Windows_Trojan_Lokibot_0f421617 | unknown | unknown | - 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x133fc:$a2: last_compatible_version
|
0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x123ff:$des3: 68 03 66 00 00
- 0x15ff0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x160bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack | SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth | - 0x2ef38:$s1: http://
- 0x326f3:$s1: http://
- 0x3314c:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
- 0x2ef40:$s2: https://
- 0x2ef38:$f1: http://
- 0x326f3:$f1: http://
- 0x2ef40:$f2: https://
|
0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack | JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | |
0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x315f6:$f1: FileZilla\recentservers.xml
- 0x31636:$f2: FileZilla\sitemanager.xml
- 0x2f8a6:$b2: Mozilla\Firefox\Profiles
- 0x2f610:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x2f7ba:$s4: logins.json
- 0x30664:$s6: wand.dat
- 0x2f0e4:$a1: username_value
- 0x2f0d4:$a2: password_value
- 0x2f71f:$a3: encryptedUsername
- 0x2f78c:$a3: encryptedUsername
- 0x2f732:$a4: encryptedPassword
- 0x2f7a0:$a4: encryptedPassword
|
0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack | Windows_Trojan_Lokibot_1f885282 | unknown | unknown | - 0x324b0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
|
0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack | Windows_Trojan_Lokibot_0f421617 | unknown | unknown | - 0x1f86f:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
|
0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x2ee74:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x2f0bc:$a2: last_compatible_version
|
0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x2e0b3:$des3: 68 03 66 00 00
- 0x324b0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x3257c:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack | SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth | - 0x13e78:$s1: http://
- 0x17633:$s1: http://
- 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
- 0x13e80:$s2: https://
- 0x13e78:$f1: http://
- 0x17633:$f1: http://
- 0x13e80:$f2: https://
|
3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack | JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | |
3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack | JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | |
3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack | INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen | - 0x16536:$f1: FileZilla\recentservers.xml
- 0x16576:$f2: FileZilla\sitemanager.xml
- 0x147e6:$b2: Mozilla\Firefox\Profiles
- 0x14550:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
- 0x146fa:$s4: logins.json
- 0x155a4:$s6: wand.dat
- 0x14024:$a1: username_value
- 0x14014:$a2: password_value
- 0x1465f:$a3: encryptedUsername
- 0x146cc:$a3: encryptedUsername
- 0x14672:$a4: encryptedPassword
- 0x146e0:$a4: encryptedPassword
|
3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack | Windows_Trojan_Lokibot_1f885282 | unknown | unknown | - 0x173f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
|
3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack | Windows_Trojan_Lokibot_0f421617 | unknown | unknown | - 0x47bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
|
3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack | Loki_1 | Loki Payload | kevoreilly | - 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
- 0x13ffc:$a2: last_compatible_version
|
3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack | Lokibot | detect Lokibot in memory | JPCERT/CC Incident Response Group | - 0x12fff:$des3: 68 03 66 00 00
- 0x173f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
- 0x174bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
|
Click to see the 43 entries |