General

  • Target

    a0a102ed692d3504a346c492a920e6f3f7fd8e464efe46d19b2f01c619cb6a7a

  • Size

    206KB

  • Sample

    220521-nemcasgfgn

  • MD5

    1cecf38c2fce9cdebad68ed71b297ad5

  • SHA1

    1f3ec102de284ebaba871e5e785e36c7b68521f2

  • SHA256

    a0a102ed692d3504a346c492a920e6f3f7fd8e464efe46d19b2f01c619cb6a7a

  • SHA512

    ebdda097f5b74bc712474586d3ad1d4d2cfb468b1998c6887253777b2a80ecdc7f808804f8868e525629bc5233da82e01d203d35d0508f46dc8aa4715945e0a6

Malware Config

Extracted

Family

lokibot

C2

http://sieqwarteg.com/chief/chief2/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      TT advice- EURO 11045.00_pdf.exe

    • Size

      365KB

    • MD5

      c1b6502fd0429dea4200601d804a9950

    • SHA1

      98468e524ebe79ac2ad942c62ca36ed52d72382b

    • SHA256

      8ee4be1165d1e195defb89faee6746304f38293aac4f59d332408e3bff243822

    • SHA512

      ecbed057567abf013e4487ff13f2c0017c487e3f4a248341dc79087131c9b6a0a430a0fcc74f369277366dee7f6733795a8779564795b98891c4a9438f4872c4

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks