General

  • Target

    10f675a780a5814df0a79b673213a2ed2989816a517797df5656551b0819789c.exe

  • Size

    871KB

  • Sample

    210728-kwkwrwzj26

  • MD5

    52db97007f406b46ae0cc4b82ad882be

  • SHA1

    dc5fefda3c4c080ce976c6938cc9bb097ffded63

  • SHA256

    10f675a780a5814df0a79b673213a2ed2989816a517797df5656551b0819789c

  • SHA512

    dc23eb967f4b0961344ef99f294c1ee593271ee8c29cb7173258614f46994ed4c19dd7645943d9539b6de339082783904d5ad34217be95a2ab76cc60b2bfb67d

Malware Config

Extracted

Family

lokibot

C2

http://ibmcloudstorage.ml/prof2/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      10f675a780a5814df0a79b673213a2ed2989816a517797df5656551b0819789c.exe

    • Size

      871KB

    • MD5

      52db97007f406b46ae0cc4b82ad882be

    • SHA1

      dc5fefda3c4c080ce976c6938cc9bb097ffded63

    • SHA256

      10f675a780a5814df0a79b673213a2ed2989816a517797df5656551b0819789c

    • SHA512

      dc23eb967f4b0961344ef99f294c1ee593271ee8c29cb7173258614f46994ed4c19dd7645943d9539b6de339082783904d5ad34217be95a2ab76cc60b2bfb67d

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks