General

  • Target

    a5484d4719b1e940afabc2e5cb433edd3578641b23548a8e078f6f8d02ac6db8

  • Size

    549KB

  • Sample

    220704-j97jhaffbn

  • MD5

    77c2cb4dc872da61727bcb1d9fa9d80f

  • SHA1

    2b0a0ca69fe8a0d507e0db2a29eaf4bb00a95c0e

  • SHA256

    a5484d4719b1e940afabc2e5cb433edd3578641b23548a8e078f6f8d02ac6db8

  • SHA512

    a02886e2dcad25fafb48a52ea341a818185cb5450593a206897d059944b65345f6a8588b1731a2a60d97684c1536c03aefcecab3bdb6e0972e384fdad2bb65dc

Malware Config

Extracted

Family

lokibot

C2

http://45.133.1.20/rostov2/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

http://�����������Ѝ������Й���Й��я��

Targets

    • Target

      a5484d4719b1e940afabc2e5cb433edd3578641b23548a8e078f6f8d02ac6db8

    • Size

      549KB

    • MD5

      77c2cb4dc872da61727bcb1d9fa9d80f

    • SHA1

      2b0a0ca69fe8a0d507e0db2a29eaf4bb00a95c0e

    • SHA256

      a5484d4719b1e940afabc2e5cb433edd3578641b23548a8e078f6f8d02ac6db8

    • SHA512

      a02886e2dcad25fafb48a52ea341a818185cb5450593a206897d059944b65345f6a8588b1731a2a60d97684c1536c03aefcecab3bdb6e0972e384fdad2bb65dc

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot Fake 404 Response

      suricata: ET MALWARE LokiBot Fake 404 Response

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks