General

  • Target

    ed5f94641cd29fda1170ab41a361e6b66afd2bbaaae103180697c986577077a7.exe

  • Size

    546KB

  • Sample

    220514-q5hsxaccfj

  • MD5

    921956181bf711675791732d3124632d

  • SHA1

    7ffee5dd8fcbaf8c0dbfab1f57660c10cc0be8db

  • SHA256

    ed5f94641cd29fda1170ab41a361e6b66afd2bbaaae103180697c986577077a7

  • SHA512

    c1ae5c6aa7bd14c9c0589b9e1567f1b7ff38cb6bd77a19e431892cb68c4094dff1e4453d610292dbb7eb4691c7491fe9db47305a2d263b76e58340b43e2964b9

Malware Config

Extracted

Family

lokibot

C2

https://spetralnet2.com/wp-admin/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      ed5f94641cd29fda1170ab41a361e6b66afd2bbaaae103180697c986577077a7.exe

    • Size

      546KB

    • MD5

      921956181bf711675791732d3124632d

    • SHA1

      7ffee5dd8fcbaf8c0dbfab1f57660c10cc0be8db

    • SHA256

      ed5f94641cd29fda1170ab41a361e6b66afd2bbaaae103180697c986577077a7

    • SHA512

      c1ae5c6aa7bd14c9c0589b9e1567f1b7ff38cb6bd77a19e431892cb68c4094dff1e4453d610292dbb7eb4691c7491fe9db47305a2d263b76e58340b43e2964b9

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks