General

  • Target

    4e6d691ce07204deefd9cbcc9c310bbc6c2e89c8361ca09e7ed1da4c01b2ad04.exe

  • Size

    826KB

  • Sample

    200709-957hnxlws6

  • MD5

    ec5dbab7a41c69f9bcb9acc0b09a9429

  • SHA1

    4abc5ce4b9efc69c8d78279bf94b8e237c0614c7

  • SHA256

    4e6d691ce07204deefd9cbcc9c310bbc6c2e89c8361ca09e7ed1da4c01b2ad04

  • SHA512

    acc4118f115bab5c89c648422c316ec197cae0fdaa4f0cb1d1e6a6821b72795b7504dfbd297da08e4406adce088fc77c8d1bd074fad9cca44f1aa5477a00ae3f

Malware Config

Extracted

Family

lokibot

C2

http://79.124.8.8/plesk-site-preview/chongelctricals.com/http/79.124.8.8/adamsn/Panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      4e6d691ce07204deefd9cbcc9c310bbc6c2e89c8361ca09e7ed1da4c01b2ad04.exe

    • Size

      826KB

    • MD5

      ec5dbab7a41c69f9bcb9acc0b09a9429

    • SHA1

      4abc5ce4b9efc69c8d78279bf94b8e237c0614c7

    • SHA256

      4e6d691ce07204deefd9cbcc9c310bbc6c2e89c8361ca09e7ed1da4c01b2ad04

    • SHA512

      acc4118f115bab5c89c648422c316ec197cae0fdaa4f0cb1d1e6a6821b72795b7504dfbd297da08e4406adce088fc77c8d1bd074fad9cca44f1aa5477a00ae3f

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks