General

  • Target

    07acaa3b3daa02b7553fec44fa3a8de8fbe2f438204bda2aba8c4a2a92c7b6bc

  • Size

    249KB

  • Sample

    211111-s4bz3sgfcm

  • MD5

    308da612e1deb4a2aa968cc2db215c13

  • SHA1

    9784fcaf00d0979e76b93d23171f8c027b4068e3

  • SHA256

    07acaa3b3daa02b7553fec44fa3a8de8fbe2f438204bda2aba8c4a2a92c7b6bc

  • SHA512

    a5b1e677699269e5802ef037d7a83e0401d4f484d190389a8da101f02c3b7cd73400472ae91078da72379da37c63e9f71e466b8ce1efb4043320c04f41366e01

Malware Config

Extracted

Family

lokibot

C2

http://secure01-redirect.net/ga27/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      07acaa3b3daa02b7553fec44fa3a8de8fbe2f438204bda2aba8c4a2a92c7b6bc

    • Size

      249KB

    • MD5

      308da612e1deb4a2aa968cc2db215c13

    • SHA1

      9784fcaf00d0979e76b93d23171f8c027b4068e3

    • SHA256

      07acaa3b3daa02b7553fec44fa3a8de8fbe2f438204bda2aba8c4a2a92c7b6bc

    • SHA512

      a5b1e677699269e5802ef037d7a83e0401d4f484d190389a8da101f02c3b7cd73400472ae91078da72379da37c63e9f71e466b8ce1efb4043320c04f41366e01

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks