General

  • Target

    6618caba6d73150fc10c2e4d2cacf3ce63e86997224b9555b48d3756efeb6d3c

  • Size

    176KB

  • Sample

    220521-pwvwfagah2

  • MD5

    b934e224625eb413ee380000fc6774a3

  • SHA1

    c2dbd3ccf0f343e7aafc77aa282a725c852e7910

  • SHA256

    6618caba6d73150fc10c2e4d2cacf3ce63e86997224b9555b48d3756efeb6d3c

  • SHA512

    4c2749dc6eeadb2b1d9f8ac84f343cf342c39495e00ef7c83d4b5bb97369ad7a2a3239398af1775dc39089cce84427c097ea64080c5375f96ff394dc75c6ae2f

Malware Config

Extracted

Family

lokibot

C2

http://beckhoff-th.com/kon/kon1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      BANK_RECEIPT_PDF.exe

    • Size

      209KB

    • MD5

      13b9d3990d60a56c5659e1bfb63a87c5

    • SHA1

      66eaefe211b835712145edd82fea6fceeac4f31e

    • SHA256

      d99e015f0b74d50841cb3122a2c84d2ba549667e3018d571d1383fe4ec49ae69

    • SHA512

      3742ebd3b9f005b465bf1f44218707e3fadf9fc8574727ba57258688c01c426982149fc9c6334e94b6364adbaf525eb181768fcf4fbd11dea248894b1556586c

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks