General

  • Target

    2506b2a02661090a54c83c345336f60cdf5bacbb344b40a9de074b2581b7b442.exe

  • Size

    431KB

  • Sample

    220514-q5jefaccgj

  • MD5

    b2f075e56e759d2151c56599cf1a6930

  • SHA1

    5c0ec4f0832a11c61708063dacb01ac3203a118b

  • SHA256

    2506b2a02661090a54c83c345336f60cdf5bacbb344b40a9de074b2581b7b442

  • SHA512

    f7662e67ef702f125aaec4d7c52b3e0816b53859de18870e50b41a18a49993686fc5f8299983045a0679ef418f5735e2c6a56c77c7c37fcb05791195f1896434

Malware Config

Extracted

Family

lokibot

C2

http://sempersim.su/gf24/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      2506b2a02661090a54c83c345336f60cdf5bacbb344b40a9de074b2581b7b442.exe

    • Size

      431KB

    • MD5

      b2f075e56e759d2151c56599cf1a6930

    • SHA1

      5c0ec4f0832a11c61708063dacb01ac3203a118b

    • SHA256

      2506b2a02661090a54c83c345336f60cdf5bacbb344b40a9de074b2581b7b442

    • SHA512

      f7662e67ef702f125aaec4d7c52b3e0816b53859de18870e50b41a18a49993686fc5f8299983045a0679ef418f5735e2c6a56c77c7c37fcb05791195f1896434

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot Fake 404 Response

      suricata: ET MALWARE LokiBot Fake 404 Response

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks