General

  • Target

    83212dc99a020b7d37a385d273f4a075db369d2032840c0ed77a682278487f4e.exe

  • Size

    348KB

  • Sample

    200707-t8kg3yhtvj

  • MD5

    4ab98a275e83315ab25f376c2500fc00

  • SHA1

    bb3e84826ed9dade2311bdb0be60b0f639041ebb

  • SHA256

    83212dc99a020b7d37a385d273f4a075db369d2032840c0ed77a682278487f4e

  • SHA512

    970be824cdb2c76c80f63a23efc056cb13d252d98088a986fbd870909c2cae25d5488c82e3ca5c162a30f3f33256d7f0264414a37bf54052bf4c3a74be712010

Malware Config

Extracted

Family

lokibot

C2

http://bayercornpany.com/php/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      83212dc99a020b7d37a385d273f4a075db369d2032840c0ed77a682278487f4e.exe

    • Size

      348KB

    • MD5

      4ab98a275e83315ab25f376c2500fc00

    • SHA1

      bb3e84826ed9dade2311bdb0be60b0f639041ebb

    • SHA256

      83212dc99a020b7d37a385d273f4a075db369d2032840c0ed77a682278487f4e

    • SHA512

      970be824cdb2c76c80f63a23efc056cb13d252d98088a986fbd870909c2cae25d5488c82e3ca5c162a30f3f33256d7f0264414a37bf54052bf4c3a74be712010

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks