General

  • Target

    D17YQcMaWgh42nE.exe

  • Size

    636KB

  • Sample

    211203-m45dqsbbf7

  • MD5

    0085cf25325f1c53e0ef357283b6e064

  • SHA1

    6529b7166db11aec6493b6772212c8a9562a65fd

  • SHA256

    e87293828706a189ffece3665370e6c94a67cbbbe9c68bac5442e893b1b0fec0

  • SHA512

    4703927b91b84a42417e0ed52675e5d0eebdf453c6fa421d2461e6950d643a093e62d4fa48404fc96ad5c937ee6dd079f111059abcc0254b7c4ea3608776d07e

Malware Config

Extracted

Family

lokibot

C2

http://secure01-redirect.net/gb16/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      D17YQcMaWgh42nE.exe

    • Size

      636KB

    • MD5

      0085cf25325f1c53e0ef357283b6e064

    • SHA1

      6529b7166db11aec6493b6772212c8a9562a65fd

    • SHA256

      e87293828706a189ffece3665370e6c94a67cbbbe9c68bac5442e893b1b0fec0

    • SHA512

      4703927b91b84a42417e0ed52675e5d0eebdf453c6fa421d2461e6950d643a093e62d4fa48404fc96ad5c937ee6dd079f111059abcc0254b7c4ea3608776d07e

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks