General

  • Target

    01ff4e0c53937341750bfe805ea7bc8cc0abcb01739679f4f5687a2039eb2558

  • Size

    188KB

  • Sample

    220521-xmnd1acag9

  • MD5

    2538e6ea7d4cd2744ea5c0354969b886

  • SHA1

    863c68ab834e57e6a627aba39d0d4a0ae73d6b3a

  • SHA256

    01ff4e0c53937341750bfe805ea7bc8cc0abcb01739679f4f5687a2039eb2558

  • SHA512

    1387d2d327430392b1f2c1b8a246abf8ec4e1d68e0585e9dfb0ab7f4445c9724d9ebd9301e39d0f773ee949da402a9b19cb1b0d7676c0aa284a48805cecab1f8

Malware Config

Extracted

Family

lokibot

C2

http://beckhoff-th.com/chief/chief1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      PI-#V18-1515_pdf.exe

    • Size

      277KB

    • MD5

      e36aba300f0d38d56717151275e82e21

    • SHA1

      c48c487b4b2ae4ed4c3e5ef44fb6e7adfd5b3d14

    • SHA256

      0fc133c6b2424f5a8e5464200b09941c3f636266bf4e5207f067737e0b53e8f6

    • SHA512

      927338964254b65ca0c9184bad6dc578ef7ee8e906a55b6a2559a028b0dcc7a8f6573fd5d4f03046af7862ada00be801ecaa6d04a98f49daf3df04f458714773

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks