General

  • Target

    7.1.BZ2

  • Size

    361KB

  • Sample

    211202-rt3vdacge6

  • MD5

    1d4e8725b9b78c490c158560755c8076

  • SHA1

    b1c35da3f2a0a5688f80f53865abcfbd34e570c3

  • SHA256

    7649cab2be828ebb2e6f5dde1d021554e541fdba10d30c772a5a1f31e435e348

  • SHA512

    11e1d91751108709095d22dd9e1ac44197fc526ac035cdf70ff8d4432bfea81793b815dcada0faa90e3a9bc7fccb47f21af4992394a2ea662744e6ec7e15365a

Malware Config

Extracted

Family

lokibot

C2

http://secure01-redirect.net/gb5/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Proforma Invioce_pdf_______________________________________________.exe

    • Size

      534KB

    • MD5

      4fe6a34089cb484c6e9b48d0ba7be1d0

    • SHA1

      82603b00e2274cde7228c8c00ae5973ca3318c81

    • SHA256

      c4e212c8f47223db762bb6b1b862d0e7a667c767b3f79c409c0945a1144478cd

    • SHA512

      a46d63a0a10f76e505277ee26457ffa72196d148fd5de311c37d305e421b2e1813ff0cdc6ed931af58017de31052b46ad7b54942bf2cd7a97b8d98988e0b73a8

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks