General

  • Target

    PO docs.exe

  • Size

    533KB

  • Sample

    220705-pxa8esbbd9

  • MD5

    8e4f199c3c6abdcd7b0ab3c8d00b7b39

  • SHA1

    fa4e287e60eca5c0c95c0d20fd9e988d42a021a2

  • SHA256

    762e0b4b5ac10ebdfa880cdca1989f607cb623a0a58292bd2424314378b04e81

  • SHA512

    be87ec1abcfc530ff0d3d011d7a915276d3c191e824ce69fa84293d1d839d9a49a87f918f0fa91c2a847b82999777d2af40febc95f956c29e9f793c8ea4a44ef

Malware Config

Extracted

Family

lokibot

C2

http://185.102.170.20/demo/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      PO docs.exe

    • Size

      533KB

    • MD5

      8e4f199c3c6abdcd7b0ab3c8d00b7b39

    • SHA1

      fa4e287e60eca5c0c95c0d20fd9e988d42a021a2

    • SHA256

      762e0b4b5ac10ebdfa880cdca1989f607cb623a0a58292bd2424314378b04e81

    • SHA512

      be87ec1abcfc530ff0d3d011d7a915276d3c191e824ce69fa84293d1d839d9a49a87f918f0fa91c2a847b82999777d2af40febc95f956c29e9f793c8ea4a44ef

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot Fake 404 Response

      suricata: ET MALWARE LokiBot Fake 404 Response

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks