General

  • Target

    DHL Express_Invoice-MAJW.gz.exe

  • Size

    661KB

  • Sample

    200708-9dsymk4zas

  • MD5

    b6146ca5f17e754daba280ab48528172

  • SHA1

    7ca0ab50aa22e288a5386e3d87ea0454a9e056c2

  • SHA256

    b0cc51f23ac5a30c25ecd9e817b445d66027872eff2dcbe9ea1808a945f6be98

  • SHA512

    2f91cc31fb41bcdab598f7b7fecd10b759c5df39c523a53c057bfe25a41cb9f1d60789241f24d70bc0ed707383b7be3c7acedce7da8bf1cf9be95c973e6283fb

Malware Config

Extracted

Family

lokibot

C2

airmanselectiontest.com/oo/Panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      DHL Express_Invoice-MAJW.gz.exe

    • Size

      661KB

    • MD5

      b6146ca5f17e754daba280ab48528172

    • SHA1

      7ca0ab50aa22e288a5386e3d87ea0454a9e056c2

    • SHA256

      b0cc51f23ac5a30c25ecd9e817b445d66027872eff2dcbe9ea1808a945f6be98

    • SHA512

      2f91cc31fb41bcdab598f7b7fecd10b759c5df39c523a53c057bfe25a41cb9f1d60789241f24d70bc0ed707383b7be3c7acedce7da8bf1cf9be95c973e6283fb

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks