General

  • Target

    5926da75d2342aefa3d1b4213d8fe0e142a889fe45a8abe1748cfb2073658253

  • Size

    104KB

  • Sample

    220203-qz5qgsaaan

  • MD5

    68d3136c98a460396420576371ca5504

  • SHA1

    49c5a8e68934334d0d01bc4ad9ffce4802e60d2f

  • SHA256

    5926da75d2342aefa3d1b4213d8fe0e142a889fe45a8abe1748cfb2073658253

  • SHA512

    ff086672978b2eddcee69eb9601d8699dada83974cb6c355eab50b39d6c2619a3aa3f634a9dac4af2c8ac7e4e9a9e96a583b0aa4096c486b387c77553119abf3

Malware Config

Extracted

Family

lokibot

C2

http://angilfesciences.com/grace/mercy/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      5926da75d2342aefa3d1b4213d8fe0e142a889fe45a8abe1748cfb2073658253

    • Size

      104KB

    • MD5

      68d3136c98a460396420576371ca5504

    • SHA1

      49c5a8e68934334d0d01bc4ad9ffce4802e60d2f

    • SHA256

      5926da75d2342aefa3d1b4213d8fe0e142a889fe45a8abe1748cfb2073658253

    • SHA512

      ff086672978b2eddcee69eb9601d8699dada83974cb6c355eab50b39d6c2619a3aa3f634a9dac4af2c8ac7e4e9a9e96a583b0aa4096c486b387c77553119abf3

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Sets service image path in registry

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks