General

  • Target

    b14df7e61bbbe9158b2851136d18c942b22629df86ccf9d25a0522da43eee9a2.exe

  • Size

    1.2MB

  • Sample

    211206-papsaseabm

  • MD5

    cb2441099d6f5e62e912dafe7d4159c0

  • SHA1

    7b1874dd66b87c86126176078b5bc2ca29c6be0f

  • SHA256

    b14df7e61bbbe9158b2851136d18c942b22629df86ccf9d25a0522da43eee9a2

  • SHA512

    b4a20ea93db156655e9bb23d711b0ca54c22f6145cc48eb4ebd9706084bab2127447a665a0fb4ddb0d24a9b3e76e2252f3accfcf7febd9330ea289250f0f8055

Malware Config

Extracted

Family

lokibot

C2

http://lokich.xyz/icecobe/so/lxx.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      b14df7e61bbbe9158b2851136d18c942b22629df86ccf9d25a0522da43eee9a2.exe

    • Size

      1.2MB

    • MD5

      cb2441099d6f5e62e912dafe7d4159c0

    • SHA1

      7b1874dd66b87c86126176078b5bc2ca29c6be0f

    • SHA256

      b14df7e61bbbe9158b2851136d18c942b22629df86ccf9d25a0522da43eee9a2

    • SHA512

      b4a20ea93db156655e9bb23d711b0ca54c22f6145cc48eb4ebd9706084bab2127447a665a0fb4ddb0d24a9b3e76e2252f3accfcf7febd9330ea289250f0f8055

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks