General

  • Target

    60e7b7da05ecbd0f5badda6f55ddd865c73453b620067a0dbfc4e7cc76caf416.exe

  • Size

    178KB

  • Sample

    220514-q5jp7shhg9

  • MD5

    943a92b0b61eec9be60863ae6848f2b4

  • SHA1

    42076d3cae711e804795fc4e5852e8f1dd9fd934

  • SHA256

    60e7b7da05ecbd0f5badda6f55ddd865c73453b620067a0dbfc4e7cc76caf416

  • SHA512

    bb06b79412bf0462d5ede5ede1790ea528c9f47e00370d41a373aa49c49cb27dd8f7862c823c729e919a84c4928b735fe0f54a4868b8e555660fbeb80ca99df7

Malware Config

Extracted

Family

lokibot

C2

http://62.197.136.176/liyan/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      60e7b7da05ecbd0f5badda6f55ddd865c73453b620067a0dbfc4e7cc76caf416.exe

    • Size

      178KB

    • MD5

      943a92b0b61eec9be60863ae6848f2b4

    • SHA1

      42076d3cae711e804795fc4e5852e8f1dd9fd934

    • SHA256

      60e7b7da05ecbd0f5badda6f55ddd865c73453b620067a0dbfc4e7cc76caf416

    • SHA512

      bb06b79412bf0462d5ede5ede1790ea528c9f47e00370d41a373aa49c49cb27dd8f7862c823c729e919a84c4928b735fe0f54a4868b8e555660fbeb80ca99df7

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot Fake 404 Response

      suricata: ET MALWARE LokiBot Fake 404 Response

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks