General

  • Target

    payment.exe

  • Size

    318KB

  • Sample

    200708-t7jnydkd3a

  • MD5

    e8d71994c54e4a7538f3beaf6e2e8c1e

  • SHA1

    48bfcf8b3455c62e88a7e3b38a720809be7cab32

  • SHA256

    ca9f6a11a9200ccde207ba921ae6a6dfef747f88934b90404e779a314ef92ea2

  • SHA512

    9dd21bce296f5760278de1942899dbfc0c310a83a27aafd7cde7a2e7f38f1c11d0f4657b993de70fdf4871628171763447d6f2e4f522416dbbf0c0440f705a1f

Malware Config

Extracted

Family

lokibot

C2

http://mecharnise.ir/ea1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      payment.exe

    • Size

      318KB

    • MD5

      e8d71994c54e4a7538f3beaf6e2e8c1e

    • SHA1

      48bfcf8b3455c62e88a7e3b38a720809be7cab32

    • SHA256

      ca9f6a11a9200ccde207ba921ae6a6dfef747f88934b90404e779a314ef92ea2

    • SHA512

      9dd21bce296f5760278de1942899dbfc0c310a83a27aafd7cde7a2e7f38f1c11d0f4657b993de70fdf4871628171763447d6f2e4f522416dbbf0c0440f705a1f

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks