General

  • Target

    704c79f08835a93bc64bdb960c63dfa849a4c0fd5867255522d01a57eb979293.exe

  • Size

    370KB

  • Sample

    211021-wm3cgsbebq

  • MD5

    1f0a0de6491ff5fb6c2e095a9104777b

  • SHA1

    3d4957efef2f8f1570853e4e9468134ef5be1787

  • SHA256

    704c79f08835a93bc64bdb960c63dfa849a4c0fd5867255522d01a57eb979293

  • SHA512

    33915cfce235d783430b9377a3c194610fddca871edba4547b9c04452dba3fe09dbf61ca80ffc9ce0b00b780c8ce72fbcb53de08b4283a7f46c2d6860b69511e

Malware Config

Extracted

Family

lokibot

C2

http://63.250.40.204/~wpdemo/file.php?search=475803

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      704c79f08835a93bc64bdb960c63dfa849a4c0fd5867255522d01a57eb979293.exe

    • Size

      370KB

    • MD5

      1f0a0de6491ff5fb6c2e095a9104777b

    • SHA1

      3d4957efef2f8f1570853e4e9468134ef5be1787

    • SHA256

      704c79f08835a93bc64bdb960c63dfa849a4c0fd5867255522d01a57eb979293

    • SHA512

      33915cfce235d783430b9377a3c194610fddca871edba4547b9c04452dba3fe09dbf61ca80ffc9ce0b00b780c8ce72fbcb53de08b4283a7f46c2d6860b69511e

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks