General

  • Target

    3c2b3abaf73e3b4acd3aa7dcddc3458ab33d31349a68a3908fceb117c59c5650

  • Size

    978KB

  • Sample

    220703-kacqhsbhbk

  • MD5

    4ab13794eaf40c67142cabd4461fb324

  • SHA1

    b3cde5b886c125a159e4d928e605a197e1a061cf

  • SHA256

    3c2b3abaf73e3b4acd3aa7dcddc3458ab33d31349a68a3908fceb117c59c5650

  • SHA512

    e4248032e72ec041af143e2ad0166edc5f26f4bc1322bd4a9299c018ce5fe205412a71a4cd24c222eb57f88b3ee9ac0637ff00717b138fd14fc13f1d17de9df9

Malware Config

Extracted

Family

lokibot

C2

http://84.38.132.211/oki/Panel/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      3c2b3abaf73e3b4acd3aa7dcddc3458ab33d31349a68a3908fceb117c59c5650

    • Size

      978KB

    • MD5

      4ab13794eaf40c67142cabd4461fb324

    • SHA1

      b3cde5b886c125a159e4d928e605a197e1a061cf

    • SHA256

      3c2b3abaf73e3b4acd3aa7dcddc3458ab33d31349a68a3908fceb117c59c5650

    • SHA512

      e4248032e72ec041af143e2ad0166edc5f26f4bc1322bd4a9299c018ce5fe205412a71a4cd24c222eb57f88b3ee9ac0637ff00717b138fd14fc13f1d17de9df9

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks