General

  • Target

    dd9f677c964c81fe9af3c6fcad870a07e7f3fdd78917391789c8f21c09e442fb.exe

  • Size

    235KB

  • Sample

    220324-xsm1esdbb3

  • MD5

    e3e088fc838eedef856bd24f1b73e0f8

  • SHA1

    953c733031c82439544ced04e3f6ca45c8a3a19c

  • SHA256

    dd9f677c964c81fe9af3c6fcad870a07e7f3fdd78917391789c8f21c09e442fb

  • SHA512

    afb75a2b4fe95b565f8766a5354d9aab67580e8c9a3fde0fecf3f9c58eec0728320bbd94c981919a383c8c4ee21a73d505a8fd1c336bb3f0bf18389399eaa052

Malware Config

Extracted

Family

lokibot

C2

http://furnaceshst.net/ge3/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      dd9f677c964c81fe9af3c6fcad870a07e7f3fdd78917391789c8f21c09e442fb.exe

    • Size

      235KB

    • MD5

      e3e088fc838eedef856bd24f1b73e0f8

    • SHA1

      953c733031c82439544ced04e3f6ca45c8a3a19c

    • SHA256

      dd9f677c964c81fe9af3c6fcad870a07e7f3fdd78917391789c8f21c09e442fb

    • SHA512

      afb75a2b4fe95b565f8766a5354d9aab67580e8c9a3fde0fecf3f9c58eec0728320bbd94c981919a383c8c4ee21a73d505a8fd1c336bb3f0bf18389399eaa052

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks