General

  • Target

    563cbacf99c3b199fa77556c06838d2faec615ad4f5fe54a284d4acda5dd0bf1

  • Size

    656KB

  • Sample

    220414-pxd93scbb3

  • MD5

    2866997447acfb7d1ba792d30c6b37c9

  • SHA1

    eaecfa946df1077d3c6abdfb738a57e32065b7ff

  • SHA256

    563cbacf99c3b199fa77556c06838d2faec615ad4f5fe54a284d4acda5dd0bf1

  • SHA512

    7e18b75ebc17baad5a69f38bd499e339655e7a12b6d719f59916395fe9542e1c01e509700031f6eac5e754e1ad071f7e2e3ed4ca217263f4bdc669d4371ae4b2

Malware Config

Extracted

Family

lokibot

C2

http://quehenbergar.com/cocoo/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      563cbacf99c3b199fa77556c06838d2faec615ad4f5fe54a284d4acda5dd0bf1

    • Size

      656KB

    • MD5

      2866997447acfb7d1ba792d30c6b37c9

    • SHA1

      eaecfa946df1077d3c6abdfb738a57e32065b7ff

    • SHA256

      563cbacf99c3b199fa77556c06838d2faec615ad4f5fe54a284d4acda5dd0bf1

    • SHA512

      7e18b75ebc17baad5a69f38bd499e339655e7a12b6d719f59916395fe9542e1c01e509700031f6eac5e754e1ad071f7e2e3ed4ca217263f4bdc669d4371ae4b2

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Meta Stealer Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks