General

  • Target

    59dfd8b6e33eb0e27233aaa1ffcd5e635b4207ff62ba8e1b0ae337c7553ab746

  • Size

    403KB

  • Sample

    220521-n2xrjseeb9

  • MD5

    7a1aba87b5f953db8a40648f87f32c1c

  • SHA1

    586f5947886b58fbc47d4bac7fa7da2d8913dff0

  • SHA256

    59dfd8b6e33eb0e27233aaa1ffcd5e635b4207ff62ba8e1b0ae337c7553ab746

  • SHA512

    2f07ab2e2b923139c70eb840727e7b6083f61067f516c508c0b38784eba2b7fe84053ca7068271e08aa52ebda5a6dc5dea19c0554c26fe65cc66f1bbff28fa79

Malware Config

Targets

    • Target

      PO_121220002941.exe

    • Size

      730KB

    • MD5

      09cb80f28d47e2082702f4f8f89fe289

    • SHA1

      779ea37a1cd013ef3b9c15a431ae411b2095fd36

    • SHA256

      5be0aff5e9bf958f99789e62dd5bdf3b63cfe0e57fcbd1c7144d9a5e71f530f7

    • SHA512

      7c13a8fc770b960df94d0d4c574e19539ca12de56fa2766500c2b90c05b8e4cd31c7e60ebd7d5a9e19acc41eee4eaf729ef91bf7a4839d31a5a627314d6f0c8d

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks