General

  • Target

    dc567ec4e012d719e078ce163f7c993274b16c1124f025cc87e23ce641ecde2b.exe

  • Size

    498KB

  • Sample

    220521-yhwp9achh6

  • MD5

    652c23a2826f489186a909e1bf0d811d

  • SHA1

    4d0c5f5a45b16409f91a2d8c3d7cce6322346f29

  • SHA256

    dc567ec4e012d719e078ce163f7c993274b16c1124f025cc87e23ce641ecde2b

  • SHA512

    91b8c75cc7a700e0652a8ed8492da1dafa3b337f91534104d9561738106413dd7af58b5380c2c474579b88b8bbf97f0807fef160ad0916e8b3548517b5fcf501

Malware Config

Extracted

Family

lokibot

C2

http://sempersim.su/gg8/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      dc567ec4e012d719e078ce163f7c993274b16c1124f025cc87e23ce641ecde2b.exe

    • Size

      498KB

    • MD5

      652c23a2826f489186a909e1bf0d811d

    • SHA1

      4d0c5f5a45b16409f91a2d8c3d7cce6322346f29

    • SHA256

      dc567ec4e012d719e078ce163f7c993274b16c1124f025cc87e23ce641ecde2b

    • SHA512

      91b8c75cc7a700e0652a8ed8492da1dafa3b337f91534104d9561738106413dd7af58b5380c2c474579b88b8bbf97f0807fef160ad0916e8b3548517b5fcf501

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot Fake 404 Response

      suricata: ET MALWARE LokiBot Fake 404 Response

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks