General

  • Target

    816f4764cc13ffb9ac1b6d35ddb22d1d7a26091a367dbc07906ae24d4b6db469.exe

  • Size

    1.0MB

  • Sample

    220514-q5kx9saab4

  • MD5

    acb77a395e323d9c6dfa697942e7588d

  • SHA1

    65588d4bbf975aaa7746e1064fcbff2240740330

  • SHA256

    816f4764cc13ffb9ac1b6d35ddb22d1d7a26091a367dbc07906ae24d4b6db469

  • SHA512

    db466bbb01d27ac5f8bb3b566f3ab9a6e8cb8b80504f18604bb630dfb3aef017da283f461703decd7a20be6bec66e42e352b697b46336c78cd841b408df0a2e2

Malware Config

Extracted

Family

lokibot

C2

http://sempersim.su/fo/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      816f4764cc13ffb9ac1b6d35ddb22d1d7a26091a367dbc07906ae24d4b6db469.exe

    • Size

      1.0MB

    • MD5

      acb77a395e323d9c6dfa697942e7588d

    • SHA1

      65588d4bbf975aaa7746e1064fcbff2240740330

    • SHA256

      816f4764cc13ffb9ac1b6d35ddb22d1d7a26091a367dbc07906ae24d4b6db469

    • SHA512

      db466bbb01d27ac5f8bb3b566f3ab9a6e8cb8b80504f18604bb630dfb3aef017da283f461703decd7a20be6bec66e42e352b697b46336c78cd841b408df0a2e2

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot Fake 404 Response

      suricata: ET MALWARE LokiBot Fake 404 Response

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks