General

  • Target

    40c4ff83099a52478b3ffc4c4a82b3a809cfe44475dfa3b6c85a2e13854cbd13.exe

  • Size

    281KB

  • Sample

    211202-wlyb5sbacl

  • MD5

    3a6bdc952b8b9f8d1cd85812f5657f03

  • SHA1

    f3f49660538afa105aed607c10654878ec771494

  • SHA256

    40c4ff83099a52478b3ffc4c4a82b3a809cfe44475dfa3b6c85a2e13854cbd13

  • SHA512

    10ba486248e97171ba73a9dfa1907f1d59a1fa327db067627fabb2ae09087c475b174bbdb7c5082e373f3f911fc08b2da08b11ad177a1eb6907f8bb5ea6e394a

Malware Config

Extracted

Family

lokibot

C2

http://secure01-redirect.net/gb15/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      40c4ff83099a52478b3ffc4c4a82b3a809cfe44475dfa3b6c85a2e13854cbd13.exe

    • Size

      281KB

    • MD5

      3a6bdc952b8b9f8d1cd85812f5657f03

    • SHA1

      f3f49660538afa105aed607c10654878ec771494

    • SHA256

      40c4ff83099a52478b3ffc4c4a82b3a809cfe44475dfa3b6c85a2e13854cbd13

    • SHA512

      10ba486248e97171ba73a9dfa1907f1d59a1fa327db067627fabb2ae09087c475b174bbdb7c5082e373f3f911fc08b2da08b11ad177a1eb6907f8bb5ea6e394a

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks