Analysis

  • max time kernel
    562s
  • max time network
    421s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    28-04-2022 07:35

General

  • Target

    lokibot.exe

  • Size

    104KB

  • MD5

    1917f888cacd48b9a8d4832449e8d34f

  • SHA1

    d732e6a78ea44b77943c1e74e19c9ea92d0b7a28

  • SHA256

    3deeb55fefe05f51c41b1724780e5de1e33a432e01f455e3ab5d2af5ca655464

  • SHA512

    901b095813605c89945e1b5354fef210b0a68d94a79156b5d405116c5f00a15571046a0e9d65830cdaea8a3deda657a6d4ac6744ecef30cca6b26033d8b61b55

Malware Config

Signatures

  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lokibot.exe
    "C:\Users\Admin\AppData\Local\Temp\lokibot.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • outlook_office_path
    • outlook_win_path
    PID:1160

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1160-54-0x0000000075581000-0x0000000075583000-memory.dmp

    Filesize

    8KB