General

  • Target

    fbc2b5163b6d128f9c70475b7349be8ac1db476416b0a5e81424a456cf6c68f0.exe

  • Size

    230KB

  • Sample

    200529-prwq6pdt4s

  • MD5

    c0b17f93823d4c4de913f646154e8523

  • SHA1

    83703feb7391fadd6f6ec70c655297164f590140

  • SHA256

    fbc2b5163b6d128f9c70475b7349be8ac1db476416b0a5e81424a456cf6c68f0

  • SHA512

    d6c67db737326a57f651913d73403f046563a398ae64f922494da0fcb4ea8f67e69d29bd7bd25356975bb777785f5b3ba78abb061374efa9cafa1b17644edb78

Malware Config

Extracted

Family

lokibot

C2

http://www.peamachinerylltd.com/loki/ororo/Panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      fbc2b5163b6d128f9c70475b7349be8ac1db476416b0a5e81424a456cf6c68f0.exe

    • Size

      230KB

    • MD5

      c0b17f93823d4c4de913f646154e8523

    • SHA1

      83703feb7391fadd6f6ec70c655297164f590140

    • SHA256

      fbc2b5163b6d128f9c70475b7349be8ac1db476416b0a5e81424a456cf6c68f0

    • SHA512

      d6c67db737326a57f651913d73403f046563a398ae64f922494da0fcb4ea8f67e69d29bd7bd25356975bb777785f5b3ba78abb061374efa9cafa1b17644edb78

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks