General

  • Target

    cd759300c8e46a70f35f4242e75b987beb809b89f244d7a7235dc33b868e245f.exe

  • Size

    224KB

  • Sample

    200708-6eacx5c91n

  • MD5

    de8e255db63ba62ce08aafcada997a76

  • SHA1

    d0c19ad11433c5528e6f4c46a34b271d34cfcef7

  • SHA256

    cd759300c8e46a70f35f4242e75b987beb809b89f244d7a7235dc33b868e245f

  • SHA512

    ff10b8b5d6117f689b8cbf9acb083d353407fadcc3351a5dba6fa44ca6b58967f30ce4bd8da1545fa8fbb6b226b7ed4e93725e5b3b5ef17fbb7539d0122d9d74

Malware Config

Extracted

Family

lokibot

C2

http://ftytr.cf/adm/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      cd759300c8e46a70f35f4242e75b987beb809b89f244d7a7235dc33b868e245f.exe

    • Size

      224KB

    • MD5

      de8e255db63ba62ce08aafcada997a76

    • SHA1

      d0c19ad11433c5528e6f4c46a34b271d34cfcef7

    • SHA256

      cd759300c8e46a70f35f4242e75b987beb809b89f244d7a7235dc33b868e245f

    • SHA512

      ff10b8b5d6117f689b8cbf9acb083d353407fadcc3351a5dba6fa44ca6b58967f30ce4bd8da1545fa8fbb6b226b7ed4e93725e5b3b5ef17fbb7539d0122d9d74

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks