General

  • Target

    68f3818f8970bec207b3d142e1741a9826682735f0a05d3d29e9ccf5d31720ac

  • Size

    387KB

  • Sample

    220521-mzrbbafhbq

  • MD5

    491fca9ed352d334826425be0e324c2e

  • SHA1

    f448c2e8e462ffa20f336d675991fd133e7bb3b1

  • SHA256

    68f3818f8970bec207b3d142e1741a9826682735f0a05d3d29e9ccf5d31720ac

  • SHA512

    ea31f12453d443f5363b8dd7891ef8aab4baa96586b37ff842e9661718fbbbf15a2388b81c69f5530fc673bcb28a2ba431fdf7f619118664ec79044262b69bf4

Malware Config

Targets

    • Target

      scan copy-2125689_pdf.exe

    • Size

      676KB

    • MD5

      a78c00ac45e583af6f1f2fdd337e5123

    • SHA1

      1b979ad2f69ab927323b0bc4898e393c4c72eb57

    • SHA256

      e0e2b9ccdeafb58afceb0e90a9365112b5cb9446054e06b18e9ef51841e6f36c

    • SHA512

      93e775c72f0032197c39470b09563a240c40259fb26c28264f40ff82f8c3af7aad2eec69b28a7e158bb8ee546f77d8567734a329ec0c11380e00d4a965a41fe2

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks