General

  • Target

    36505f1650fa0f171269034309f7e3aff79068633d893323a9ab93ab8267c1b3

  • Size

    1.1MB

  • Sample

    220521-w9j5esbcc2

  • MD5

    ea8023cb401c96ab874f35bcd1fad1b4

  • SHA1

    02258406f45e16fbd30491162c6a8b2b62ddaaf0

  • SHA256

    36505f1650fa0f171269034309f7e3aff79068633d893323a9ab93ab8267c1b3

  • SHA512

    6cc055e4fbb5a5df5f9e53a97f86a4d84e4c20aeb0fd90f50760a43dce32af3bfae0fbafa6c7702d2538dbdb0d3353a2547b743aae976b024377921b24823d6c

Malware Config

Extracted

Family

lokibot

C2

http://mahetechasia.com/dabs/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      EIKODO_purchase_order_May.exe

    • Size

      1.5MB

    • MD5

      bb0a4d763a2e008469dab25a31fcc8d3

    • SHA1

      ee62f3600a279b0bdbfe904ce0bce64005cf5201

    • SHA256

      c140875c9c07abe9bf32f2e6fc9d24e9e8b7e8c96b6f32203b423983749f3597

    • SHA512

      8ee31cde61a47b291f39482a5608b2f5d0168b462897ce693387f2d4f6dbc2fac8b729431017f4441a08cc0ee188e10bffa1056d189643f52a1ccb4faa4c403e

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Collection

Email Collection

1
T1114

Tasks