General

  • Target

    e14c0a5111004734fe2d39162c2164a7b3916011209be8cc4c30d823ac193a11

  • Size

    260KB

  • Sample

    220520-3nplcacbcm

  • MD5

    9b010e555b9ef6a5bd4b7c1332cd21a9

  • SHA1

    e8a4bf28b166642dd92eceb1d5c446af102750fd

  • SHA256

    e14c0a5111004734fe2d39162c2164a7b3916011209be8cc4c30d823ac193a11

  • SHA512

    f0429df4637ff42e8242e192ec7f52e35b186e63be62a38c83a05bdb373b1ede2047a1f900d1f067dc7d8713a78197c9b32b7c5bc4fcf52527d3109f33bfa7a7

Malware Config

Extracted

Family

lokibot

C2

http://79.124.8.8/plesk-site-preview/krockabread.com/http/79.124.8.8/smik/Panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      PO.exe

    • Size

      359KB

    • MD5

      2eb37ab18bb1a92b38cdf58b02882197

    • SHA1

      ec7a0142286c0130ff1710da4c868e7db4bd55bf

    • SHA256

      57d86d719f126ab791a63997ed510dec77649924b2e47d54b73ed3641b56678f

    • SHA512

      15b3c864a9d95817638bcae323c773e886d0c7cc4236abdd9fd9a2614ed7b886f073499997ffa83ebbc6ce5d14b011d78ee365b3f22dead9b288c9130132b025

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks