General

  • Target

    58af5a72f21e64e635661aaa2d09a72f6eb3e12117eef93ee5d4cb0840a5a31d.exe

  • Size

    588KB

  • Sample

    200716-9ynvj1yb3j

  • MD5

    0d9e0a5ee2370181e6df2d49bf3245b0

  • SHA1

    1c5a84f18225c10123f2f96879976eacda666c65

  • SHA256

    58af5a72f21e64e635661aaa2d09a72f6eb3e12117eef93ee5d4cb0840a5a31d

  • SHA512

    9276f6794455ec0c3143af07d9bb299261c875ce3f342ade786ded83bd4f2835972089429870835398b46a0aa5ca6b3cf244df47e52f3397e8a2e1f649db8f3a

Malware Config

Extracted

Family

lokibot

C2

http://flexpak-th.com/osama/aboki/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      58af5a72f21e64e635661aaa2d09a72f6eb3e12117eef93ee5d4cb0840a5a31d.exe

    • Size

      588KB

    • MD5

      0d9e0a5ee2370181e6df2d49bf3245b0

    • SHA1

      1c5a84f18225c10123f2f96879976eacda666c65

    • SHA256

      58af5a72f21e64e635661aaa2d09a72f6eb3e12117eef93ee5d4cb0840a5a31d

    • SHA512

      9276f6794455ec0c3143af07d9bb299261c875ce3f342ade786ded83bd4f2835972089429870835398b46a0aa5ca6b3cf244df47e52f3397e8a2e1f649db8f3a

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks