General

  • Target

    d81b40d87d7caee2e52fa109131ce7702810c9fb0f98f8a15fdd72f14146e513

  • Size

    740KB

  • Sample

    220625-f6dkgafghp

  • MD5

    a305fe5a1a2d98b54d9acfb97f2d2525

  • SHA1

    a9a03774732c584faef112beec2605d333b4181c

  • SHA256

    d81b40d87d7caee2e52fa109131ce7702810c9fb0f98f8a15fdd72f14146e513

  • SHA512

    8aeb61df7da99da3854c534c07c348f0d89cd1174722f8ad3a72d6606bb9cfb420afa3465f42a5a8fdad20b1a226ee157717c047607321d887bd2406f3ccb71d

Malware Config

Extracted

Family

lokibot

C2

http://citiline.org.ng/XXD123-TY/TULIP8890890-56788/Panel/five/fre,php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      d81b40d87d7caee2e52fa109131ce7702810c9fb0f98f8a15fdd72f14146e513

    • Size

      740KB

    • MD5

      a305fe5a1a2d98b54d9acfb97f2d2525

    • SHA1

      a9a03774732c584faef112beec2605d333b4181c

    • SHA256

      d81b40d87d7caee2e52fa109131ce7702810c9fb0f98f8a15fdd72f14146e513

    • SHA512

      8aeb61df7da99da3854c534c07c348f0d89cd1174722f8ad3a72d6606bb9cfb420afa3465f42a5a8fdad20b1a226ee157717c047607321d887bd2406f3ccb71d

    • Detect Neshta Payload

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks