General

  • Target

    e1e62fbf8a6bdeaf99eec0c4acc750dd5cbd0638731261fbbe8b149975ddc982.exe

  • Size

    123KB

  • Sample

    220514-q5kx9scdaq

  • MD5

    e1463b97ee667e41750ae4531146df03

  • SHA1

    2b45b7992c30e83bd067c694a5895149fa10cedc

  • SHA256

    e1e62fbf8a6bdeaf99eec0c4acc750dd5cbd0638731261fbbe8b149975ddc982

  • SHA512

    b91034e21f7fa6a6b12883ef080f27173eb0524b1c160da4ad33abcd09ac0a9fdc8fa9817321c8823a89655afc40030dbb381eeaef410e34fd9c05ce4473243b

Malware Config

Extracted

Family

lokibot

C2

http://aboyox.xyz/aboy/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      e1e62fbf8a6bdeaf99eec0c4acc750dd5cbd0638731261fbbe8b149975ddc982.exe

    • Size

      123KB

    • MD5

      e1463b97ee667e41750ae4531146df03

    • SHA1

      2b45b7992c30e83bd067c694a5895149fa10cedc

    • SHA256

      e1e62fbf8a6bdeaf99eec0c4acc750dd5cbd0638731261fbbe8b149975ddc982

    • SHA512

      b91034e21f7fa6a6b12883ef080f27173eb0524b1c160da4ad33abcd09ac0a9fdc8fa9817321c8823a89655afc40030dbb381eeaef410e34fd9c05ce4473243b

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks