General

  • Target

    d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe

  • Size

    253KB

  • Sample

    200520-smtz1nlksn

  • MD5

    489a833e8b95b22d0e0fe116f9f415f3

  • SHA1

    ef6de7f3433f62378497df12f47fc3b718751f13

  • SHA256

    d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6

  • SHA512

    7c0f54cff7cda0b74e2e5d542fcc82ac821c56f723ecbc7a3870802dceb471163bb3a90f3f5d92e7f9c7c77af0dd1aeea6db159a3112f6e3f3d5c837a3c1b551

Malware Config

Extracted

Family

lokibot

C2

http://beheshtsoft.com/help/mentor/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6.exe

    • Size

      253KB

    • MD5

      489a833e8b95b22d0e0fe116f9f415f3

    • SHA1

      ef6de7f3433f62378497df12f47fc3b718751f13

    • SHA256

      d9a4f02d908fbb6ed781ca3193fee8cedc3ae4a800c0acd92134f352436ed4c6

    • SHA512

      7c0f54cff7cda0b74e2e5d542fcc82ac821c56f723ecbc7a3870802dceb471163bb3a90f3f5d92e7f9c7c77af0dd1aeea6db159a3112f6e3f3d5c837a3c1b551

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks