General

  • Target

    5a219789ff691b312aaaf2321c69f22b08f1483c39fda6602bfb4f4b5db60808

  • Size

    458KB

  • Sample

    220521-n2w51seeb8

  • MD5

    1484d3d6839156ed16de53bd1e74e090

  • SHA1

    e04ceac0b3059403d53bd31f192b4e2303b72210

  • SHA256

    5a219789ff691b312aaaf2321c69f22b08f1483c39fda6602bfb4f4b5db60808

  • SHA512

    caa35a4446e8e45ac0b7134f2a5f21e35148a372f5e973a6a5232d370330eeb0a4c1803f946756647aebedd1037350a6e23adf9f40b68e5edfb47756a14ef7ff

Malware Config

Targets

    • Target

      SOR Price 062820KATARA PROJECT - MECH SOR (Tender).exe

    • Size

      832KB

    • MD5

      2e018760f30cafe649036f80a058339a

    • SHA1

      d4d9986aa867390a66346d9f5e879f6f407b974d

    • SHA256

      8415b396574342f35cc4e90b8a2d1cb7632cb1d762142088cd71fce4473fc0f0

    • SHA512

      d041d40f221c99254027f57dbb16b5ba43dfe196231de5fc7d4218029678c086a8f3aac9493fc1d33c4ad49182925eb3db5a96f81366624f892e19868780078c

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks