General

  • Target

    c621f6f6ac9d846039beaa639d87d36d78d7484ec73ac11fbd105a7132f4d6b3.exe

  • Size

    178KB

  • Sample

    220514-q5jefaccgm

  • MD5

    592c22b9cbed889d85aed60134630f7e

  • SHA1

    14b1e8ad6dcc0698745abaa2548a21693851cc23

  • SHA256

    c621f6f6ac9d846039beaa639d87d36d78d7484ec73ac11fbd105a7132f4d6b3

  • SHA512

    668ea8f68558fab7731423f0037768aee590c5f346f0149a2e543021618549ed03efcad6f847cfb2d189e9740ef6faa1a012b98e6a335703bd16b6a4a3316c3c

Malware Config

Extracted

Family

lokibot

C2

http://62.197.136.176/liyan/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      c621f6f6ac9d846039beaa639d87d36d78d7484ec73ac11fbd105a7132f4d6b3.exe

    • Size

      178KB

    • MD5

      592c22b9cbed889d85aed60134630f7e

    • SHA1

      14b1e8ad6dcc0698745abaa2548a21693851cc23

    • SHA256

      c621f6f6ac9d846039beaa639d87d36d78d7484ec73ac11fbd105a7132f4d6b3

    • SHA512

      668ea8f68558fab7731423f0037768aee590c5f346f0149a2e543021618549ed03efcad6f847cfb2d189e9740ef6faa1a012b98e6a335703bd16b6a4a3316c3c

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot Fake 404 Response

      suricata: ET MALWARE LokiBot Fake 404 Response

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks