General

  • Target

    779fab5e3826ba8165c00507f22d08a0a81dd321d36b3426190565d87c1ffe6b

  • Size

    932KB

  • Sample

    211207-pnhk5shbdn

  • MD5

    d131738343d3d9a57d7d0c9aa1dc30cd

  • SHA1

    f78ceafb6ca40ed1fc14aef37166a249a4291891

  • SHA256

    779fab5e3826ba8165c00507f22d08a0a81dd321d36b3426190565d87c1ffe6b

  • SHA512

    fb95e15d847b43fa5773e4d8dec9e750734844d63fa57355277d6f15708f4fbcdb816ad582d3d62eee21dd8bc020e64c3794cc304463bdd54bdfddb8e66f8bc6

Malware Config

Extracted

Family

lokibot

C2

http://lkk2.xyz/ddcontact/w2/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      779fab5e3826ba8165c00507f22d08a0a81dd321d36b3426190565d87c1ffe6b

    • Size

      932KB

    • MD5

      d131738343d3d9a57d7d0c9aa1dc30cd

    • SHA1

      f78ceafb6ca40ed1fc14aef37166a249a4291891

    • SHA256

      779fab5e3826ba8165c00507f22d08a0a81dd321d36b3426190565d87c1ffe6b

    • SHA512

      fb95e15d847b43fa5773e4d8dec9e750734844d63fa57355277d6f15708f4fbcdb816ad582d3d62eee21dd8bc020e64c3794cc304463bdd54bdfddb8e66f8bc6

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks