General

  • Target

    03ab14a2ea7f2b12c5ac33a523b2c82c1c42733371de62bd97fb245042c76847

  • Size

    176KB

  • Sample

    220521-ntkr1shbhl

  • MD5

    12ebe4d938346a1f615f4d9153e13001

  • SHA1

    a004e36dc82737ce81166757bf578aa43114e914

  • SHA256

    03ab14a2ea7f2b12c5ac33a523b2c82c1c42733371de62bd97fb245042c76847

  • SHA512

    9a7220c3ac6b15ce4e4d4f0b255de3a5807e3c83fee6e8524f19cbbcc94beb8fe098d019f8db69a822adf01f5799ad193409b8aac5d2c18df0099d1586a66c4d

Malware Config

Extracted

Family

lokibot

C2

http://flexpak-th.com/osama/aboki/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      Agency Appoinment Letter MT OCEAN CHEMIST_pdf.exe

    • Size

      267KB

    • MD5

      37f98d2b76244766621fae0886a9b0f0

    • SHA1

      1805c94ed80886e462dd0cc3f99e7f69257d1434

    • SHA256

      e8c8d336f3a316e249d0c96ded653ea7a197a85044bc277f8624f46cc7812bc4

    • SHA512

      21e451bf45877bc2f302258b2b93dd03618f175bf4e7eaf11fdbd2461aacc12c2dd31d78480238a2c4ebb51fd0d9ac67aee208eba8948a19b07b8ec5cb8c8c6d

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks