General

  • Target

    fee0780cf99da7110b447206c6ab6a3edd658fc2c004c876b22d8194594265f4.exe

  • Size

    664KB

  • Sample

    211201-wnt3hahgd6

  • MD5

    b24c429ee0694dca6112612cb527f9b8

  • SHA1

    b3cdd9f596f41c32a89e7e4aa0fcc2f653232058

  • SHA256

    fee0780cf99da7110b447206c6ab6a3edd658fc2c004c876b22d8194594265f4

  • SHA512

    4b6c2212966be767b4974b9cb6d6c53bef9ee20ecc7a42a5bf9f7251e3f32dfed9d35498ea0d1e601083aea77b26c9f50beacd1ba9b75fb8dbe60b816793f8e4

Malware Config

Extracted

Family

lokibot

C2

http://sudais.com.pk/oo/Panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      fee0780cf99da7110b447206c6ab6a3edd658fc2c004c876b22d8194594265f4.exe

    • Size

      664KB

    • MD5

      b24c429ee0694dca6112612cb527f9b8

    • SHA1

      b3cdd9f596f41c32a89e7e4aa0fcc2f653232058

    • SHA256

      fee0780cf99da7110b447206c6ab6a3edd658fc2c004c876b22d8194594265f4

    • SHA512

      4b6c2212966be767b4974b9cb6d6c53bef9ee20ecc7a42a5bf9f7251e3f32dfed9d35498ea0d1e601083aea77b26c9f50beacd1ba9b75fb8dbe60b816793f8e4

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks