General

  • Target

    3e7b5b4a5539cde2f54aee8ef15b1d95cae8259489a0a67238b54ae16b92b56c

  • Size

    952KB

  • Sample

    220701-h458tahedp

  • MD5

    2a082d9dfc35836b00f41e6e303cb410

  • SHA1

    6a7a871cafeadecb2fe3123b63b32b271b3cce87

  • SHA256

    3e7b5b4a5539cde2f54aee8ef15b1d95cae8259489a0a67238b54ae16b92b56c

  • SHA512

    1933b0c7d45c31e6fef0f9fed656e807450308f1c17417e7d3e103061f06564c85232305f92c36bda35310fd191855399434f058097d918c70ed3043cb442c13

Malware Config

Extracted

Family

lokibot

C2

http://playingnewgameers.tk/bin/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      3e7b5b4a5539cde2f54aee8ef15b1d95cae8259489a0a67238b54ae16b92b56c

    • Size

      952KB

    • MD5

      2a082d9dfc35836b00f41e6e303cb410

    • SHA1

      6a7a871cafeadecb2fe3123b63b32b271b3cce87

    • SHA256

      3e7b5b4a5539cde2f54aee8ef15b1d95cae8259489a0a67238b54ae16b92b56c

    • SHA512

      1933b0c7d45c31e6fef0f9fed656e807450308f1c17417e7d3e103061f06564c85232305f92c36bda35310fd191855399434f058097d918c70ed3043cb442c13

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks