General

  • Target

    e8f718ba0dcc30a6ccf1e88f24940233eeeaf8e154f26969682f9e04077d89a6.exe

  • Size

    568KB

  • Sample

    220521-yhwp9agbdl

  • MD5

    dc950959943e3248b740c828045fc0d2

  • SHA1

    8cbf56a945a8738bf35d96148644734bfc34b6b5

  • SHA256

    e8f718ba0dcc30a6ccf1e88f24940233eeeaf8e154f26969682f9e04077d89a6

  • SHA512

    c50d3692ffd175487f4e802e74db65fc29a6abff7ec18e0aaf2d77bcf4d0543ed07fbcf01d89acca0338d4665f799560ec1ad2b794d58ad46d9fe1bd9c0329e7

Malware Config

Extracted

Family

lokibot

C2

http://sempersim.su/gg11/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      e8f718ba0dcc30a6ccf1e88f24940233eeeaf8e154f26969682f9e04077d89a6.exe

    • Size

      568KB

    • MD5

      dc950959943e3248b740c828045fc0d2

    • SHA1

      8cbf56a945a8738bf35d96148644734bfc34b6b5

    • SHA256

      e8f718ba0dcc30a6ccf1e88f24940233eeeaf8e154f26969682f9e04077d89a6

    • SHA512

      c50d3692ffd175487f4e802e74db65fc29a6abff7ec18e0aaf2d77bcf4d0543ed07fbcf01d89acca0338d4665f799560ec1ad2b794d58ad46d9fe1bd9c0329e7

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Collection

Email Collection

1
T1114

Tasks