General

  • Target

    2175d9acfb00790f1169c87ee52591317e3a2f2a63b3931ca863c2462962bc7e.exe

  • Size

    585KB

  • Sample

    220521-yhx83sdab6

  • MD5

    81735a1c5330f00fc83ed54396f551b5

  • SHA1

    1fd5bc1439e40c8b590416ac3a13561b9969a805

  • SHA256

    2175d9acfb00790f1169c87ee52591317e3a2f2a63b3931ca863c2462962bc7e

  • SHA512

    91fb4c303b2fcc0f2850b38dc47ee956c525ad419d736b5155da3002ffbf7df8fa06be48041e136df406ce26d8b3585df92f4c83027680a734bb1e3bf6e53875

Malware Config

Extracted

Family

lokibot

C2

http://198.187.30.47/p.php?id=7124741524802130

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      2175d9acfb00790f1169c87ee52591317e3a2f2a63b3931ca863c2462962bc7e.exe

    • Size

      585KB

    • MD5

      81735a1c5330f00fc83ed54396f551b5

    • SHA1

      1fd5bc1439e40c8b590416ac3a13561b9969a805

    • SHA256

      2175d9acfb00790f1169c87ee52591317e3a2f2a63b3931ca863c2462962bc7e

    • SHA512

      91fb4c303b2fcc0f2850b38dc47ee956c525ad419d736b5155da3002ffbf7df8fa06be48041e136df406ce26d8b3585df92f4c83027680a734bb1e3bf6e53875

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks