General

  • Target

    whitty.exe

  • Size

    154KB

  • Sample

    200713-h2hnkdcchj

  • MD5

    2e107acd5b8ed0e66c5fee0513ace7c1

  • SHA1

    94fc8fd5e841283747390f80583392dc85f845bb

  • SHA256

    57e052aa747095c82cdc7e459d734e98bf1dde6853d94f2b1179f47b30ddcdad

  • SHA512

    93d27f39f10a4c5c27adba3e1bd06a2189d36d2bf8e3250585733ec80d7d783daa09e5c9ea2264a4458adc972b4ef702736058b45e9e38ac064c341c535bed26

Malware Config

Extracted

Family

lokibot

C2

http://79.124.8.8/plesk-site-preview/akinsab.ru/http/79.124.8.8/whitty/Panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      whitty.exe

    • Size

      154KB

    • MD5

      2e107acd5b8ed0e66c5fee0513ace7c1

    • SHA1

      94fc8fd5e841283747390f80583392dc85f845bb

    • SHA256

      57e052aa747095c82cdc7e459d734e98bf1dde6853d94f2b1179f47b30ddcdad

    • SHA512

      93d27f39f10a4c5c27adba3e1bd06a2189d36d2bf8e3250585733ec80d7d783daa09e5c9ea2264a4458adc972b4ef702736058b45e9e38ac064c341c535bed26

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks