General

  • Target

    f0eb25d93145b922898752c4c973c53a7b157c0a1a5052fbee243851ce58985f

  • Size

    987KB

  • Sample

    220521-w89cxseean

  • MD5

    37e3f2fcd9821147a38738f1d9bc6819

  • SHA1

    9e25cfc44f8f08c0f7da24256f625549ae71d173

  • SHA256

    f0eb25d93145b922898752c4c973c53a7b157c0a1a5052fbee243851ce58985f

  • SHA512

    72bbc192232b3ef3b4f1543dbc3ed1578d291ec9c141fea6c046df89360115fb8e1e3cabc97e4aa242054017a21a71c5fe2c0fcf5a70e8283587a4505f6dd4b1

Malware Config

Extracted

Family

lokibot

C2

http://oneflextiank.com/click/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      EIKODO_PURCHASE-ORDER-MAY.exe

    • Size

      1.4MB

    • MD5

      0277b9d4e3a1da6a501acfde1777ba82

    • SHA1

      bad9604e63ed6bbcc4697b163b01cdecb9db6255

    • SHA256

      c224d671ef8ea5bfdc03b9a33d7ae043827b83c2ddc96e7ce128efb36f26fb9e

    • SHA512

      8b2918c4093c877379f9d49ae86b8c0e504975cb4db889114777a0ff67d3a2234c39e879b1a7a8373781c560fb5036abb8665131949d401a3f6b022ac1ebbbfb

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Collection

Email Collection

1
T1114

Tasks