General

  • Target

    54c1a2aabcd252f42385c5892f6c119bfbbdcc3d4a9826bc4350895b7cd700b0

  • Size

    362KB

  • Sample

    220521-my5gjsfhal

  • MD5

    7417df4f0e5b66399894684a77fe869f

  • SHA1

    9491c1b87d5744012b046122356356192324dab9

  • SHA256

    54c1a2aabcd252f42385c5892f6c119bfbbdcc3d4a9826bc4350895b7cd700b0

  • SHA512

    5a7fa49b6fd9830ee612e802e2582ffe29da3e711f5c778b9a828b62b8f90b446861ea316410e828507b8b564e2ce069e31e7da66f88bdc1a1246b8d44f9694d

Malware Config

Targets

    • Target

      INV-SG19100009 & SG191000008_PAST_DUE.exe

    • Size

      642KB

    • MD5

      bb4d68c932cd7faa7bd254b376904634

    • SHA1

      f6b104f52268d1cba738dbeba52b54b8f4401b81

    • SHA256

      260b53ee057da88901977cb7ffc147603d16ff63181258223ad5a85f3eb43875

    • SHA512

      a202539c9c1fc5538cc8387779dc0951bba8f3ac371b3a407c9d77f9df2bf50541e8e679a4fd7c23b73996f7a80d509ffad1621386af5fc73f4d8d91eea71a7d

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks