General

  • Target

    21a8d79d6ad823c193dcb792b6da0a6020b123e9a572220ce287671f7837f61b

  • Size

    464KB

  • Sample

    220521-m584bagbhp

  • MD5

    48f52bfb8297d92d19eb83e44a0376f8

  • SHA1

    b1cb5106a488404b919c73c49d6f24b127da5a4f

  • SHA256

    21a8d79d6ad823c193dcb792b6da0a6020b123e9a572220ce287671f7837f61b

  • SHA512

    66046c31925a7f5d41e4c85b362c85d5083c321968468e426785f3ac72fed2b6059777be991b050a781d9b2ecfe1b5fcf284f7f8c76078a428610567e51a57dc

Malware Config

Targets

    • Target

      file-0271144_pdf.exe

    • Size

      843KB

    • MD5

      b06aab6ca973ed51486c9fb1b5663bcd

    • SHA1

      8ec2a7916813843b5f38725fce7790d9a3c0b764

    • SHA256

      dee003414ef681821e21dddb3feeaa903826ecaf0580fade08639c2f4194a836

    • SHA512

      b013e33c4ac03967a4a9ce46fe7c2affad3e13aaac46b1a237666c6cef2f69250b575ee790b001b0e0b1e1f937701510b890980d6001842d04209031a0647f68

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks