General

  • Target

    4383de80c7bd78d1e35e3d5a0d92a8edf079362a6503894c9be4735a5bb21716

  • Size

    545KB

  • Sample

    220707-2ks9paehem

  • MD5

    3cad7ef8cd70c33e6e7e383301fbf4a1

  • SHA1

    c2d3575588b565b1406bcf6dcaeac7ca3ddebc00

  • SHA256

    4383de80c7bd78d1e35e3d5a0d92a8edf079362a6503894c9be4735a5bb21716

  • SHA512

    304dc5566ba0f81e3da65d0d2d7ecc842981c48180137fc6079cd0240955871b7eeb815e033574ecd96c813b42066de124193bc7aaa1351641ff9a2e04121444

Malware Config

Extracted

Family

lokibot

C2

http://parkrosegroup.info/lewy/sun/ernest/solar/gem/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      4383de80c7bd78d1e35e3d5a0d92a8edf079362a6503894c9be4735a5bb21716

    • Size

      545KB

    • MD5

      3cad7ef8cd70c33e6e7e383301fbf4a1

    • SHA1

      c2d3575588b565b1406bcf6dcaeac7ca3ddebc00

    • SHA256

      4383de80c7bd78d1e35e3d5a0d92a8edf079362a6503894c9be4735a5bb21716

    • SHA512

      304dc5566ba0f81e3da65d0d2d7ecc842981c48180137fc6079cd0240955871b7eeb815e033574ecd96c813b42066de124193bc7aaa1351641ff9a2e04121444

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks