General

  • Target

    PO-10582022.rar

  • Size

    480KB

  • Sample

    220701-h28adshdel

  • MD5

    cfccd7d2d8ca4fd3fefe24828865479f

  • SHA1

    92aba72e9bd78af4e5e11ed83d8ce6e19be595b8

  • SHA256

    e8d4c4c1dc7afc5e5c7e38188ebd8ccff158201aa195f7c6c5e681fbcbbec7d6

  • SHA512

    abf439acc7d914e72de1b57f57cdca3d0a9f10fccd4a88b410408a638167c620f9b4988e802d7dcb524d838d0da38b89dfd04c05edcca809fcf6c4547b711aa0

Malware Config

Extracted

Family

lokibot

C2

http://198.187.30.47/p.php?id=22289002125658625

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      PO-10582022.exe

    • Size

      569KB

    • MD5

      37f9b2e8ef104b2a4adcab52ad429c08

    • SHA1

      0c2e7832967c91d67808fda336338e16cdd37421

    • SHA256

      3464f31088630d2c06ff50b2454ddfb6556fdbcfdcc1c5692b903ea13dde809e

    • SHA512

      93260c634f1779835117682b4e922cfa0337ca27d7cf988e49a193e95ea5ca8b7d24d34b16428464510ec22396822292911677b6fda4d89d51dcfd7a03398b84

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks