General

  • Target

    tmp

  • Size

    447KB

  • Sample

    220706-hygchabhd9

  • MD5

    a6353fcf3ae91664447917e56e6926e4

  • SHA1

    bdef778ecb05940aad34cb06c6084a62882e1a81

  • SHA256

    a268288a6fd08bdf1f7458dbfba0cfce862e6f109dc51738d51654dd2540256c

  • SHA512

    e1926c0bf85470c1b5f2448825f9b67d10e4b058f2b8b8f60b3e18c41b9380583e11dcc1f30171d1c1c6682c93f645eb33713ce5fa1923f308e7e639ffb32a0c

Malware Config

Extracted

Family

lokibot

C2

http://plxnva67001gs6gljacjpqudhatjqf.ml/BN4/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      tmp

    • Size

      447KB

    • MD5

      a6353fcf3ae91664447917e56e6926e4

    • SHA1

      bdef778ecb05940aad34cb06c6084a62882e1a81

    • SHA256

      a268288a6fd08bdf1f7458dbfba0cfce862e6f109dc51738d51654dd2540256c

    • SHA512

      e1926c0bf85470c1b5f2448825f9b67d10e4b058f2b8b8f60b3e18c41b9380583e11dcc1f30171d1c1c6682c93f645eb33713ce5fa1923f308e7e639ffb32a0c

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1

    • suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

      suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2

    • suricata: ET MALWARE LokiBot Checkin

      suricata: ET MALWARE LokiBot Checkin

    • suricata: ET MALWARE LokiBot Fake 404 Response

      suricata: ET MALWARE LokiBot Fake 404 Response

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1

    • suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

      suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2

    • suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

      suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks