General

  • Target

    551ad6db90db2f4f445211eb378853a2610cb0a7755661ef8884995473795e35

  • Size

    749KB

  • Sample

    220521-pw6myagbb3

  • MD5

    041e466bc9faa50d5236a6116d26ac78

  • SHA1

    979f1cdac87b932dd56aa3c5b7030f467a5b5a95

  • SHA256

    551ad6db90db2f4f445211eb378853a2610cb0a7755661ef8884995473795e35

  • SHA512

    34410d1fa8d21fe0f75e9fbd69fadfa0659ca4df71d80861fe8d01c1d3328439054363abd00bc2e49e43f3ee571df649c1003562ebd4ad7b840b30fbaab7b86c

Malware Config

Extracted

Family

lokibot

C2

http://niskioglasi.rs/test1/Panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      XIruF7OdxEq1htH.exe

    • Size

      899KB

    • MD5

      c7459a5a02a03a536326d0e8c725cb12

    • SHA1

      d53f5c8295a655bb27627c963b7453d97968df47

    • SHA256

      65214f0b74d25fc6436f5875e5f6d94d2aa2eefc24c0440664bcdae450ad5217

    • SHA512

      4058d8e5088939ad8a791d14daa319a9c3cebf4fe1e8d7cfc494fa95ca3ba2c1fa8fc6aba1d51c658a5302667dda3abdc4542be237276814e6ddf427b68cdfb7

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks