General

  • Target

    IRQ2107798.exe

  • Size

    243KB

  • Sample

    211029-jywb4ahfcr

  • MD5

    4eca9ad029e51e378913376e9b1e3a56

  • SHA1

    213f9cd1fa7df5d0a85cf6d91614bfbbfbc232bc

  • SHA256

    e9523f62177970ce7d70a44b499310ca51cfdd9d478237184a8743a70b4f0dc4

  • SHA512

    b5a5b3628dcaad3ce5e76acda439421bda4c117949aa44af82961bd2af5ff5c976c7a42e4e4716a1e66c35ef1957689a03de3fa14cfc535336e2a66b280656b0

Malware Config

Extracted

Family

lokibot

C2

http://63.250.40.204/~wpdemo/file.php?search=9773219

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      IRQ2107798.exe

    • Size

      243KB

    • MD5

      4eca9ad029e51e378913376e9b1e3a56

    • SHA1

      213f9cd1fa7df5d0a85cf6d91614bfbbfbc232bc

    • SHA256

      e9523f62177970ce7d70a44b499310ca51cfdd9d478237184a8743a70b4f0dc4

    • SHA512

      b5a5b3628dcaad3ce5e76acda439421bda4c117949aa44af82961bd2af5ff5c976c7a42e4e4716a1e66c35ef1957689a03de3fa14cfc535336e2a66b280656b0

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks