General

  • Target

    SecuriteInfo.com.W32.AIDetectNet.01.28996.17572

  • Size

    196KB

  • Sample

    220705-d9w5waffa3

  • MD5

    df608b1e6ca45b46e336d6b2c1459f80

  • SHA1

    487d773c1c290028ef6070f4650ab9f59bea1dc5

  • SHA256

    436f9c683b9e4050424953affd1d48ea9973687a89763b7f83d81cf5eb0ec7d2

  • SHA512

    5a2e81fc0648cae440c9545b8a2190ea4773ede90a50e2ccfe9252ba47aa65d14f7c54cd8d12e4bbcd8be0a0e58ffc211d40cf85188674b9d322922e399fc231

Malware Config

Extracted

Family

lokibot

C2

http://vmopahtqdf84hfvsqepalcbcch63gdyvah.ml/BN2/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      SecuriteInfo.com.W32.AIDetectNet.01.28996.17572

    • Size

      196KB

    • MD5

      df608b1e6ca45b46e336d6b2c1459f80

    • SHA1

      487d773c1c290028ef6070f4650ab9f59bea1dc5

    • SHA256

      436f9c683b9e4050424953affd1d48ea9973687a89763b7f83d81cf5eb0ec7d2

    • SHA512

      5a2e81fc0648cae440c9545b8a2190ea4773ede90a50e2ccfe9252ba47aa65d14f7c54cd8d12e4bbcd8be0a0e58ffc211d40cf85188674b9d322922e399fc231

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot Fake 404 Response

      suricata: ET MALWARE LokiBot Fake 404 Response

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks