General

  • Target

    fb5f0ad9424d3929f9cf00f495c71a4dece6fe651b8aa2c29e482cf7cfb6c147

  • Size

    348KB

  • Sample

    220521-m4jf9sgbap

  • MD5

    7daf337fd78e3b1eb19be1791dec2a40

  • SHA1

    d03b1a5e77825eb50224ec26329e5b656b2299c4

  • SHA256

    fb5f0ad9424d3929f9cf00f495c71a4dece6fe651b8aa2c29e482cf7cfb6c147

  • SHA512

    cfa83365c272c947f520dfe62e7ce65544b03c0276f974b73e12a921a64e941bd2d594b383bd68805ea6d1a366de74900e08958497777478efcdce74ce977e3d

Malware Config

Targets

    • Target

      SOA PT. SUN TAK INDONESIA.exe

    • Size

      610KB

    • MD5

      0a7a9244122a56e9d286dde0744290ae

    • SHA1

      1e774ca58ebf1f8172ad1eefd58732084616de10

    • SHA256

      80434f5dca269d5ef426a319de156d51a0d3268b42cb5e9239737d853a863450

    • SHA512

      6f0fc50395b5a851a53cb261637c35475b5ab68db6eeffef3b4c1c081212286e957fde9b804bd929441e7a6b1bdcb255168f1d583914f27a2d4c9cefc1375839

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks